Please turn on your JavaScript for this page to function normally.
Q&A: SOURCE Conference

Stacy Thayer is the Founder and Executive Director of SOURCE Conferences. Prior to founding SOURCE Conferences, Stacy was employed for a Fortune 500 company, where she worked …

Cybercriminals focus on targeted attacks

When it comes to computer security, bad news usually follows even the rare positive statistic. In their latest report, Websense note that they’ve seen the number of …

Q&A: Hackers and experimental artists

The “Noise vs. Subversive Computing” project is a collaborative release between noise and experimental artists working with subversive technologists and computer …

Adobe hacked, China to blame

In what seems to be normal news this week, Adobe became a victim of what the company is calling “a sophisticated, coordinated attack” and is actively investigating …

Google hacked, plans to leave China

Although it does face a variety of cyber attacks on a regular basis, Google recently acknowledged the theft of intellectual property following a sophisticated attack on their …

Q&A: Cyber threats

Mohd Noor Amin is the Chairman of IMPACT and heads the world’s largest public-private partnership against cyber threats. In this interview, he discusses the issues …

Q&A: Security testing methodologies

Jon Clay is the Senior Core Technology Marketing Manager at Trend Micro and in this interview he discusses current testing methodologies in the security industry, their good …

Q&A: Insider bank fraud

Shirley Inscoe is the Director of Financial Services Solutions at Memento. Before this, she worked at Wachovia Bank for 29 years. Shirley co-authored the book …

Q&A: Digital signatures and use cases for Adobe CDS

Steve Duncan is the Director of Entrust Certificate Services. Entrust Certificates for Adobe CDS enable organizations to use digital signatures to sign Adobe PDF files with …

Q&A: Web application scanning

Mike Shema is the Web Application Security Engineer at Qualys. In this interview, he discusses the challenges related to effective Web application scanning, the way a Web …

Q&A: Passwords

Dmitry Sklyarov is an IT security analyst at Elcomsoft. In this interview he discusses strong and insecure passwords, the compromise between usability and security as well as …

Q&A: Wireshark

Gerald Combs works with the developers of WinPcap at CACE Technologies as the Director of Open Source Projects, and is the lead developer of Wireshark. In this interview, he …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools