Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Today’s security landscape: Threats, data breaches and privacy

In this video recorded at the IBM Innovate 2010 conference, Jack Danahy, the Worldwide Security Executive, IBM/Rational at IBM, talks about current threats, data breaches and …

Vulnerability research and disclosure

Richard Brain is the Technical Director at ProCheckUp and in this interview he discusses vulnerability research, his favorite security tools, fuzzing as well as the …

BruCON planning halted by malware-infected aiport website

I was finalizing some details for my trip to BruCON next week and I stumbled upon a reported attack page on the official Charleroi Airport website: According to …

Cloud security challenges and adoption

Jim Reavis is the Executive Director of the Cloud Security Alliance. In this interview he talks about cloud security challenges, cloud computing adoption in the enterprise as …

Behind the scenes and inside workings of a CERT

Brian Honan is the founder and head of Ireland’s first Computer Emergency Response Team (CERT) team as well as owner of BH Consulting. In this interview he discusses the …

Malware detection with Neptune

In this video recorded at Black Hat USA 2010, Rami Kawach, a software architect at Qualys, talks about Neptune – a project to build an automatic malware analysis engine …

SSL Labs: Researching the technology that protects the Internet

In this video recorded at Black Hat USA 2010, Ivan Ristic talks about SSL Labs – a non-commercial research effort and collection of documents and tools related to SSL. …

Security B-Sides: The anti-conference

Security B-Sides is a DIY, open security conference that is free to all attendees. These events are corporate sponsored, centrally managed (though locally organized) and do …

BlindElephant: Open source web application fingerprinting engine

In this video recorded at Black Hat USA 2010, Patrick Thomas, a vulnerability researcher at Qualys, discusses the open source web application fingerprinting engine …

Q&A: Strong authentication

Mike Moir is a Product Manager for the Entrust IdentityGuard solution. In this interview he talks about strong authentication. Based on your experience, how critical is …

Secure by design

In this video recorded at the IBM Innovate 2010 conference, David Grant, the Director of Security Solutions at IBM Rational, talks about how software is the invisible thread …

Q&A: Sandbox for Adobe Reader

Didier Stevens is an IT security consultant well-known for his research into malicious PDF files. Since Adobe announced a sandbox for Adobe Reader, it was a perfect …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools