Podcasts

Showing Podcasts: 1–4 of 8

  • Leave the App Alone! - Attack and Defense of Android App Hijack

    June 9, 2014

    It's very risky for an App running in a rooted Android device, as this App is able to be accessed by another so it might be hijacked. After hijacked, this App's actions are monitored by others. You might lose your Facebook account password, or even get your money stolen if a banking App is hijacked. In this session, the threats of App hijack and how to prevent them will be discussed.

  • Castles in the Air: Data Protection in the Consumer Age

    February 11, 2014

    The consumerization of IT (CoIT) involves what Gartner calls the 'Nexus of Forces': Social, Cloud, Big Data, Mobile and the Internet of Things. We all see our organizations rushing to embrace these trends, and often security is left out or considered as an afterthought. This talk will present a data-centric strategy to both secure and enable the business to leverage these important trends.

  • Is Your Browser a User Agent, or a Double Agent?

    February 10, 2014

    Privacy shouldn't be an afterthought in the browser. Data security within web and mobile apps relies on technical controls like the Same Origin Policy and sandboxing. As browsers add more complex features, they must weigh the trade-off between improving APIs for developers and limiting the ability of attackers to abuse those APIs. This presentation covers privacy attacks that apps may encounter.

  • You’re Not Your iPhone – or Are You?

    October 16, 2013

    The co-presenters will explore the positive and negative aspects of the close relationship between users and their mobile device, including whether identity should be bound to the mobile device. Co-speakers: Robert Griffin, RSA and Robin Wilton, Internet Society

RSA Conference Podcasts RSS

This document was retrieved from http://www.rsaconference.com/podcasts on Thu, 23 Oct 2014 01:10:56 -0400.
© 2014 EMC Corporation. All rights reserved.