Expert analysis
Windows XP usage lower across industries
Next week, Microsoft will deliver its last set of public security patches for Windows XP. The end-of-life for XP which has been announced for a number of years now, means that …
Mobile data leakage
Attack vectors in the mobile world are related to apps, content and web. In this podcast recorded at RSA Conference 2014, Mike Raggo, Security Evangelist at MobileIron, …
Risks and opportunities of personal data, privacy, and trust
The increased number of stories on data breaches in the news today has many implications, for consumers it’s an increased risk of financial loss, identity theft and …
Eight cyber security tips I learned from The Walking Dead
Sometimes two things that don’t seem to go together, make the most magical combinations. This article is the first in a new series of security articles I’ll be …
SSL innovations
In this podcast recorded at RSA Conference 2014, Wayne Thayer, the General Manager of Security Products at GoDaddy and a member of the CA Security Council, compares and …
What do a hacker expo and cutting-edge research have in common? Amsterdam!
Dhillon Andrew Kannabhiran is the Founder and CEO of Hack in The Box, and in this interview he introduces HITBSecConf Amsterdam and offers insight on what attendees can expect …
As the World Wide Web turns 25, bots reign supreme
As the World Wide Web turns 25, we’ve just had another reminder of how far we’ve come. On March 10th, just two days before this milestone, Cryptome reported that …
Moving to the SHA-2 hashing algorithm
In this podcast recorded at RSA Conference 2014, Jay Schiavo, Director of Products and Markets at Entrust and a member of the CA Security Council, discusses why web server …
Building management security
In this podcast recorded at RSA Conference 2014, Terry McCorkle, Product Manager, Vulnerability Management, Qualys, discusses flaws in building management security that most …
Top 4 security controls: Do your PCs make the grade?
In this podcast recorded at RSA Conference 2014, Wolfgang Kandek, CTO at Qualys, talks about a new free service that help organizations implement the Top 4 Critical Security …
The role of identity in responding to the threat environment
Organizations are struggling to respond to an evolving threat environment – APTs, insider attacks, accidental breaches. Information is being stolen at an industrial …
Facebook security and privacy pitfalls
In this interview, Andrei Serbanoiu, Online Threats Researcher at Bitdefender, discusses Facebook security and privacy pitfalls, the dangers of sharing on the social network, …