Description: Security and monitoring appliances and applications are introducing all new places for attackers to get in and hide. As enterprise networks mature, they should become more secure. Unfortunately, many appliances are introducing unknown risks to your environment. Some vendors use FUD-laced marketing to hook unwitting managers and then provide a poorly-documented and "closed" product. These products can allow an attacker to get on your network and stay there. We plan to show you how to take back your tools and vet them against the kind of vulnerabilities that are rampant in today's appliances.
Tags: securitytube , Confidence , hacking , hackers , information security , convention , computer security , bside12 , bside-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.