Channel Avatar

Sourcefire @UCmb3AN9RMv4NZslyIsdI-Bg@youtube.com

8.7K subscribers - no pronouns :c

Sourcefire provides customers with Agile Security that is as


03:08
Sourcefire Demo - Visibility
02:22
AMP and the Least Prevalence Feature
02:13
AMP File and Device Trajectory
02:38
AMP Deters Would-Be Attackers
03:07
AMP and Users
02:19
4 Months to 40 Minutes
02:08
What is Cisco's Advanced Malware Protection?
06:59
Port Scanning Techniques (Part 2)
06:17
Buffer Overflows: History and Motivation
08:13
Evolution of Computer Viruses (Part 4)
06:48
Evolution of Computer Viruses (Part 3)
10:31
Evolution of Computer Viruses (Part 2)
06:48
Evolution of Computer Viruses (Part 1)
08:26
Botnets (Part 9): Peer-to-Peer Overview
07:01
Advanced IPS Functionality (Part 2)
05:49
Advanced IPS Functionality (Part 1)
06:16
Tech Report: Securing your business from wearable tech
09:56
RAM Scraping and Point of Sale Malware
06:00
Remote Access Tools and Poison Ivy: Introduction
09:24
Remote Access Tools: Anatomy of Poison Ivy Attack
06:17
Morris Worm (Part 4): Spreading Over rexec and rsh
08:50
CryptoLocker Malware | Security Chalk Talk
02:48
Efficacy Pitfalls of Traditional Malware Defenses
08:32
The Morris Worm (Part 3): How it Guessed Passwords
08:05
The Morris Worm (Part 2): Propagation via Finger Daemon Vulnerability
07:05
The Morris Worm (Part 1): Overview
08:41
Thai: āļĄāļąāļĨāđāļ§āļĢāđŒāđ€āļŸāļĨāļĄ: āđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡āđāļĨāļ°āļ„āļļāļ“āļĨāļąāļāļĐāļ“āļ°
07:41
Thai: āļ—āļģāļ„āļ§āļēāļĄāļĢāļđāđ‰āļˆāļąāļāļāļąāļšāđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡āļŠāļ­āļ‡āļŠāđˆāļ­āļ‡āđ‚āļŦāļ§āđˆ Java Zero-day
05:54
Thai: āļĄāļąāļĨāđāļ§āļĢāđŒ Flame āļ•āļ­āļ™āļ—āļĩāđˆ 2: āļ—āļģāļ„āļ§āļēāļĄāļĢāļđāđ‰āļˆāļąāļāļāļąāļšāđ€āļ—āļ„āļ™āļīāļ„āļāļēāļĢāđāļžāļĢāđˆāļāļĢāļ°āļˆāļēāļĒ
13:00
Onion Routing and TOR (Part 2): High-Level Mechanics
09:45
Onion Routing and TOR (Part 1): Motivation and Introduction
01:15
A Public Service Message from Malware
01:22
The Four Dimensions of Incident Response, Part 4: Controlling the Threat Life Cycle
00:47
The Four Dimensions of Incident Response, Part 3: Knowledge is Power
05:42
Sourcefire Chalk Talks: Advanced Firewalls, Part 1
01:43
The Four Dimensions of Incident Response, Part 2: Stopping Reinfection
01:50
The Four Dimensions of Incident Response, Part 1: Detection
10:08
Multi-Factor Authentication: What You Do
15:17
Threat Taxonomy (Part 3): Resiliency
02:20
The Attack Continuum, Part 2: During the Attack
01:28
The Attack Continuum, Part 3: After the Attack
01:44
The Attack Continuum, Part 1: Before the Attack
11:39
Man-in-the-Browser Attacks (Part 3): Countermeasures | Sourcefire Chalk Talks
10:40
Man-in-the-Browser Attacks (Part 2): Under the Hood - API Hooking
07:40
Vulnerability and Exploit Markets (Part 2): Details
10:26
Vulnerability and Exploit Markets (Part 1): Overview
07:06
Rootkits (Part 8): Defense via Hook Detection
06:00
Rootkits (Part 7): Signature-Based Defense
06:03
Rootkits (Part 6): Defense via Cross-View Detection
10:15
Rootkits (Part 5): Inline Function Patching -- Detours
12:09
Rootkits (Part 4): Import Address Table Hooking
13:36
Rootkits (Part 2): High-Level Techniques
01:24
Malvertising
13:43
Man-in-the-Browser Attacks (Part 1): Overview | Sourcefire Chalk Talks
14:30
Carberp Malware: An Overview
03:16
Advanced Malware Protection: Indications of Compromise
01:51
Exploit Kits: An Overview
01:33
The Significance of Retrospective Security
01:49
Advanced Malware Protection: Device Trajectory
02:16
Advanced Malware Protection: File Trajectory