It/Networking Multimedia Archive

  • Video: Mandiant exec explains allegations on Chinese hacking

    A private technology security firm described in extraordinary detail efforts it blamed on a Chinese military unit to hack into 141 businesses, mostly inside the U.S., and steal commercial secrets. China denies the claim. (Feb. 20)

    Video • February 21st, 2013

  • Video: Inside the FBI's DSAC program

    A review of the FBI's Domestic Security Alliance Council efforts to create public-private partnerships for intelligence sharing among corporate security leaders

    Video • September 10th, 2012

  • Video: Bill Raisch on today's top risks and threats to corporations

    Excerpted from the ASG Security Summit/The Great Conversation 2012, Intercep's Bill Raisch identifies the top risks and threat vectors that businesses face today, and discusses why a collaborative approach (working even with your industry competitors...

    Video • August 7th, 2012

  • The Case for Security Information and Event Management (SIEM) in Proactive Network Defense

    It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis, but this technology also plays a significant role in...

    Whitepaper • June 4th, 2012

  • Shayne Bates on the impact of the cloud on security

    Recorded at The Great Conversation/ASG Security Summit: Shayne Bates of LMC Consulting/Microsoft Global Security discusses the value that cloud services will bring to the security industry.

    Video • April 26th, 2012

  • ASG's William Plante on why systems integrators need to be IT experts

    Recorded at The Great Conversation: ASG's William Plante discusses the importance of IT training for security integration firms, plus how the role of the systems integrator is changing based on needs of security end-users.

    Video • April 26th, 2012

  • Networking Topology Tutorial

    The third in a series of networking tutorials from, this one covers topics like network terminations, ring topology, switches, mesh networks -- these are great videos if you're a security industry specialist wrestling with today's new...

    Video • February 24th, 2012

  • Networking Basics Tutorial

    A great tutorial video from on key IT networking basics like nodes, client/host, servers, NICs. Recommended if you know next to nothing about computer networking, but probably too basic for those of you who have configured routers and...

    Video • February 24th, 2012

  • Benefits of being a CISSP

    Internet humorist "InfoSecCynic" talks about the real value of a prominent industry certification and gives a laugh for those of you who have worked hard to get letters behind your name.

    Video • February 24th, 2012

  • Secure-24 data center security tour

    Take a fascinating tour inside the Secure-24 data center and all of its cutting edge technology complete with retinal eye scans, fingerprint scans, ID verification, video surveillance and fire suppression. The facility uses state-of-the-art technology...

    Video • February 21st, 2012

  • H.264 video compression and Verint Nextiva

    Verint-authored whitepaper examines H.264 compression for video surveillance, as applied in the company's Nextiva video management platform.

    Whitepaper • September 28th, 2009