Mirko Zorz
Large scale study of SSL configurations
Ivan Ristic is the director of engineering at Qualys and principal author of ModSecurity, the open source web application firewall. In this podcast, Ivan talks about the …
Sangria, tapas and hackers: SOURCE Barcelona 2010
I am writing this report sitting in an airplane on the tarmac of the Barcelona airport waiting for the traffic controller to give us the green light for departure. There are …
Today’s security landscape: Threats, data breaches and privacy
In this video recorded at the IBM Innovate 2010 conference, Jack Danahy, the Worldwide Security Executive, IBM/Rational at IBM, talks about current threats, data breaches and …
Vulnerability research and disclosure
Richard Brain is the Technical Director at ProCheckUp and in this interview he discusses vulnerability research, his favorite security tools, fuzzing as well as the …
BruCON planning halted by malware-infected aiport website
I was finalizing some details for my trip to BruCON next week and I stumbled upon a reported attack page on the official Charleroi Airport website: According to …
Cloud security challenges and adoption
Jim Reavis is the Executive Director of the Cloud Security Alliance. In this interview he talks about cloud security challenges, cloud computing adoption in the enterprise as …
Behind the scenes and inside workings of a CERT
Brian Honan is the founder and head of Ireland’s first Computer Emergency Response Team (CERT) team as well as owner of BH Consulting. In this interview he discusses the …
Malware detection with Neptune
In this video recorded at Black Hat USA 2010, Rami Kawach, a software architect at Qualys, talks about Neptune – a project to build an automatic malware analysis engine …
SSL Labs: Researching the technology that protects the Internet
In this video recorded at Black Hat USA 2010, Ivan Ristic talks about SSL Labs – a non-commercial research effort and collection of documents and tools related to SSL. …
Security B-Sides: The anti-conference
Security B-Sides is a DIY, open security conference that is free to all attendees. These events are corporate sponsored, centrally managed (though locally organized) and do …
BlindElephant: Open source web application fingerprinting engine
In this video recorded at Black Hat USA 2010, Patrick Thomas, a vulnerability researcher at Qualys, discusses the open source web application fingerprinting engine …
Q&A: Strong authentication
Mike Moir is a Product Manager for the Entrust IdentityGuard solution. In this interview he talks about strong authentication. Based on your experience, how critical is …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise