Please turn on your JavaScript for this page to function normally.
Security B-Sides: The anti-conference

Security B-Sides is a DIY, open security conference that is free to all attendees. These events are corporate sponsored, centrally managed (though locally organized) and do …

BlindElephant: Open source web application fingerprinting engine

In this video recorded at Black Hat USA 2010, Patrick Thomas, a vulnerability researcher at Qualys, discusses the open source web application fingerprinting engine …

Q&A: Strong authentication

Mike Moir is a Product Manager for the Entrust IdentityGuard solution. In this interview he talks about strong authentication. Based on your experience, how critical is …

Secure by design

In this video recorded at the IBM Innovate 2010 conference, David Grant, the Director of Security Solutions at IBM Rational, talks about how software is the invisible thread …

Q&A: Sandbox for Adobe Reader

Didier Stevens is an IT security consultant well-known for his research into malicious PDF files. Since Adobe announced a sandbox for Adobe Reader, it was a perfect …

Q&A: BruCON security conference

Sebastien Deleersnyder is an OWASP Foundation board member and one of the organizers of the BruCON security conference in Belgium. In this interview, he discusses this …

Q&A: Infosecurity Russia. Storage Expo. Documation 2010

Alexandr Vlasov is a recognized expert in information security and personal data, working as a Business Development Executive at Groteck Business Media. In this interview he …

Q&A: Phishing explained

Dr. Jason Hong is the CTO and co-founder of Wombat Security Technologies, a provider of cyber-security training and filtering solutions. In this interview he discusses …

Q&A: Symantec’s acquisitions and the future

Francis deSouza is senior vice president of the Enterprise Security Group at Symantec. In this interview he discusses Symantec’s recent acquisitions, how they mitigate …

Security+ SY0-201 Video Mentor

When I glance at my bookshelf, I see many certification titles racking up an imposing number of pages, and I keep wondering why there's so little interactive material …

Q&A: OWASP AppSec Research

John Wilander is the chapter leader for OWASP Sweden and expert consultant at Omegapoint AB. He’s working professionally in the intersection between software development …

Splunk.com password leak

Splunk announced on their blog that they discovered the logging of users’ passwords in clear text. The culprit is debug code that found its way onto the www.splunk.com …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools