Please turn on your JavaScript for this page to function normally.
Q&A: BruCON security conference

Sebastien Deleersnyder is an OWASP Foundation board member and one of the organizers of the BruCON security conference in Belgium. In this interview, he discusses this …

Q&A: Infosecurity Russia. Storage Expo. Documation 2010

Alexandr Vlasov is a recognized expert in information security and personal data, working as a Business Development Executive at Groteck Business Media. In this interview he …

Q&A: Phishing explained

Dr. Jason Hong is the CTO and co-founder of Wombat Security Technologies, a provider of cyber-security training and filtering solutions. In this interview he discusses …

Q&A: Symantec’s acquisitions and the future

Francis deSouza is senior vice president of the Enterprise Security Group at Symantec. In this interview he discusses Symantec’s recent acquisitions, how they mitigate …

Security+ SY0-201 Video Mentor

When I glance at my bookshelf, I see many certification titles racking up an imposing number of pages, and I keep wondering why there's so little interactive material …

Q&A: OWASP AppSec Research

John Wilander is the chapter leader for OWASP Sweden and expert consultant at Omegapoint AB. He’s working professionally in the intersection between software development …

Splunk.com password leak

Splunk announced on their blog that they discovered the logging of users’ passwords in clear text. The culprit is debug code that found its way onto the www.splunk.com …

iPhone OS 4.0 security fear, uncertainty and doubt

It is inevitable. With every mainstream technology news, comes at least one security company that wants to piggyback on it and introduce themselves to the world by making …

Web application security issues and solutions

In this video, recorded at RSA Conference 2010, Mandeep Khera from Cenzic talks about web application security issues and solutions. He focuses on the fact that most web …

Cloud computing security: An insider’s view

As CSO of Qualys, Randy Barr is responsible for security, risk management and business continuity planning of the QualysGuard platform. In this video Randy talks about cloud …

Q&A: Remote access and Entrust IdentityGuard

Mike Moir is a Product Manager for the Entrust IdentityGuard solution – a versatile authentication platform that meets diverse needs for strong second factor …

Free website malware detection service

Thousands of web sites are infected with malware daily, propagating the infection to visitors of their web sites at an increasing speed. To combat these threats, QualysGuard …

Don't miss

Cybersecurity news