Please turn on your JavaScript for this page to function normally.
Inside the mind of a computer forensics investigator

Jess Garcia, founder of One eSecurity, is a senior security engineer and an active security researcher in areas of incident response, computer forensics and honeynets. In this …

Smart grid security facts

Tony Flick has worked for over eight years in the security industry and is currently a Principal with Tampa-based FYRM Associates. He has presented at Black Hat, DEF CON, …

Cloud security risks, benefits and cost savings

Harold Moss is the Emerging Tech & Cloud Computing Technical Architect, IBM Security Strategy. In this interview he talks about the security of cloud service providers, …

Wireless security considerations

Brad Haines is chief researcher of Renderlab.net and a noted expert in the field of wireless security. Brad has spoken at many international conferences and taught several …

Past, present and future of Metasploit

HD Moore is the CSO at Rapid7 and Chief Architect of Metasploit, an open-source penetration testing platform. HD founded the Metasploit Project with the goal of becoming a …

Current threats and the evolution of cybercrime

Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is actively involved with SANS working with students, teaching, and maintaining and developing …

Weather forecast: Cloudy with a chance of compliance

If there are constants to every information security conference, they are these: threats are up and the job of the average security professional becomes more demanding every …

Best practices in approaching vendor risk assessment

When it comes to vendor risk assessment, a one-size-fits-all approach is not the way to go. Every vendor you bring into your organization will add its own unique set of risks …

How to become a published author in information security

A large security event is always filled with exceptionally clever attendees who are writers in one way or another. Some produce training materials for their employers, others …

How to sell security to senior management

While companies know they have to invest in IT to do their jobs, IT security always ends up looking like an added cost in the eyes of the management. So, what are the things …

Application security: The good, the bad and the ugly

What is the actual state of application security today? Veracode has tested over 2,900 applications using it cloud-based platform, employing static and dynamic analysis (web …

Facebook: The rise of the privacy killer

Privacy should be a human right, and we should be able to see our data, challenge it, change it and delete it. Still, we’re not in charge of our personal information at …

Don't miss

Cybersecurity news