Filters (0) (reset filters)
Sort by: Date published | Number of comments | Appreciation | Title Ascending | Title Descending | Most popular
Results per page : Page 1 of 5 (24 Result(s))
  • < Prev
  • ...
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • Next >
  • eLearning

    • Advanced Networking
    • The Command Line
    • Boot Process and Installation
    • Processes, Networking, and Logging
    • The Environment
    • Scripting and Scheduling
    • Introduction to Virtualization
    • File Systems and Device Management
    • Remote Connections and Access
    • SELinux and Troubleshooting

    Free From the Vendor
    • Solutions and Products
    • Linux Tutorial for Beginners 2015
    • Developers and Demos
    • Containerize your Datacentre
    • Enterprise Linux Management
    • Customer Reference Videos

    Reading Materials
    • Reference Architecture
    • Whitepapers
    • Red Hat Linux Desktop Data Sheet
    • Case Studies
    • Infographics

    Click on GET CONTENT button to access materials.

  • Discussion Topics:

    • What technology and market trends are occurring to meet the changing cybersecurity landscape
    • Which security technologies and processes have changed to accommodate the demands of digital business
    • How cybersecurity leaders in organizations can use these trends to their advantage


    During 2015, we've continued to see changes in cybersecurity for organizations. Threats are evolving, becoming increasingly sophisticated and more numerous. Traditional approaches to securing IT systems have expanded to include new requirements to meet the additional demands of operational technology and the Internet of Things. This webinar reviews the lessons learned and informs listeners how to use the past to create the future.

  • Chapter 1: What is Information Security
    Chapter 2: Case Studies
    Chapter 3: How to Prevent Security Incidents
    Chapter 4: If a Security Incident Occurs

  • CSA Tools
    Security Guide
    GRC (Governance, Risk management and Compliance)
    Cloud Control Matrix
    CAI Questionnaire (Consensus Assessment Initiative)
    Cloud Audit
    Cloud Trust Protocol

  • This event familiarizes the participant with the safety, control and private information privacy (SCPIP) process in an information system development context. It presents the objectives and goals of the SCPIP to reach through the various development phases and related deliverables. The event specifies the context of the SCPIP handbook, defines its objectives and key concepts associated with security, control and personal information privacy. In addition, it addresses how activities, deliverables and SCPIP roles are linked to the generic development process and discusses the software package implementation as well as the main impacts of implementing the SCPIP in a development project.

  • Fujitsu can draw on its innovative and comprehensive hardware, software and services portfolio to develop personalized solutions for every customer. This is precisely where our strength lies: Fujitsu does not provide off-the-rack IT environments; instead we always find new and ambitious solutions, and together with our customers, develop tailored strategies.

  • This content was recommended by Pierre Hamel.

    Gartner predictions for cloud security, e.g.: ""By 2016, 40% of enterprises will make proof of independent security testing a precondition for using any type of cloud service.""

  • This content was recommended by Pierre Hamel.

    Data location and regulations are leading to buying cloud services based on location. Our competitors, such as T-Systems ("TrustedCloud") are using this issue as competitive differentiation. The analyst also suggests other ideas for competitive differentiation around encryption. Trend: Use of EU model contract language as part of cloud contracts will be increasingly common.

  • This content was recommended by Pierre Hamel.

    Alsbridge's cloud predictions. They are a "3rd party advisor" to enterprises, so this has a pragmatic enterprise slant.

  • This content was recommended by Pierre Hamel.

    451's predictions about cloud in 2012. They see security fears as SLOWLY abating and that the argument that the cloud is MORE secure than your own data center (making cloud security more of a plus than a minus and turning it into an ENABLER of cloud) is starting to gain traction

  • This content was recommended by Pierre Hamel.

    Cloud computing is a broad topic, with various issues regarding types of cloud computing and the scope of deployment. Everyone has a perspective and an opinion, confusion is rampant and, in many instances, misconceptions continue amid its adoption. Here, we offer our latest predictions concerning the future of cloud computing.

  • This content was submitted by Tuck Goh.

    Virtualization separates applications, desktops, machines, networks, data and services from their physical constraints. Virtualization is an evolving concept, encompassing a broad range of technologies, tools, and methods, and can bring significant operational benefits to organizations that choose to leverage them. As with any evolving technology, however, the risks also continue to evolve and are often less understood than risks associated with more traditional technologies.

    The intent of this Information Supplement is to provide guidance on the use of virtualization in accordance with the Payment Card Industry Data Security Standard (PCI DSS). For the purposes of this paper, all references are made to the PCI DSS version 2.0.

  • This content was submitted by Tuck Goh.

    The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. This comprehensive standard is intended to help organizations proactively protect customer account data.

  • This content was submitted by Chris Hammond-Thrasher.

    Alternate title: Why I Have Tape Covering My Webcam.

    For years security professionals have been telling us not to follow links or open attachments from untrusted sources, not to click "Ignore" on your browser's security pop-ups, and not to insert untrusted thumb drives into your USB ports. Do you want to see what can happen with your own eyes? This prensentation will show you how to download, install, configure, and use the basic features of Dave Kennedy's open source hacker tool, the Social Engineering Toolkit.

  • This content was submitted by Jean-Yann Riviere.

    As cloud computing begins to mature, managing the opportunities and security challenges becomes crucial to business development.
    Cloud Security Alliance guidance in its third edition seeks to establish a stable, secure baseline for cloud operations.

    Cloud Security Alliance is :
    Global, not-for-profit organization
    Over 23,000 individual members, 100 corporate members, 50 chapters

    Corporate members : Google, Ebay, AT&T, CA, HP, Hitachi, Microsoft, PGP, Novell, RSA, Symantec, Thales etc...

  • This hacker tooltalk from the Fujitsu Edmonton Security Lab explores the Kismet open source Wi-Fi analysis tool. Learn how to set up a low cost Wi-Fi hacker lab, sniff unencrypted Wi-Fi packets without detection, and even crack WEP keys with Kismet.

  • The SSL / TLS protocol is arguably the most important encryption protocol in use today - protecting everything from our Facebook session to our online banking transactions. This brief presentation from the Fujitsu Edmonton Security lab explores why the SSL protocol is designed the way it is, provides some advise for users and developers, and finishes with a lesson in security architecture using card magic.

  • This course aims to familiarize you with the concept of Results Chain technique and its process, rules and activities involved. The course provides interactive activities, such as demos and self assessments that will help you to become familiar with the concept and will enable you to adapt an all-round structured Results Chain modeling technique, as per your organization's investment requirements.

  • This document presented at Oracle Open World 2010 by Naoki Izuta shows the extent of Fujitsu's offering in SPARC type servers.

  • This document describes a Java EE6 programming workshop

  • This document introduces techniques for deploying Java EE 6 applications with the GlassFish application server

  • Since the Oracle buyback of SUN, many changes have been made in the Java and Open Source system.
    This document describes the status of Java since the Oracle buyback of SUN.

  • Fujitsu Computer Products of America, Inc. (FCPA) is an established leader in the document imaging market, featuring state-of-the-art scanning solutions in the workgroup, departmental, and production-level scanner categories. Fujitsu scanners deliver speed, image quality, and great paper handling, along with easy integration and compatibility with over 200 document imaging applications.

  • Fujitsu provides a highly reliable biometric authentication system based on palm vein pattern recognition technology. PalmSecure™ features industry-leading authentication accuracy with extremely low false rates, and the non-intrusive and contactless reader device provides ease of use with virtually no physiological restriction for all users