Expert analysis
Computer forensic examiners are from Mars, attorneys are from Venus
The outcome of high stakes investigations and litigation can often depend on the evidence uncovered through computer forensic investigation. That fact highlights the critical …
The data backup and disaster recovery market
Mike Coney is the President and CEO of Unitrends, a provider of data backup and disaster recovery solutions. In this podcast, recorded at RSA Conference 2013, Coney talks …
Making a case for security optimism
Jeff Jones is a Director at Microsoft Trustworthy Computing. He works with enterprise CSOs and Microsoft’s internal security teams to drive security improvements into …
Security in a hyperconnected world
In this video, recorded at RSA Conference 2013, Qualys Chairman and CEO Philippe Courtot talks about the threats caused by intelligent devices as well as the changes required …
Unified identity services across data center, mobile and cloud
Tom Kemp is co-founder and CEO of Centrify Corporation, a software and cloud security provider that delivers solutions that centrally control, secure and audit access to …
Executive challenges of expanding a disaster recovery and backup business
Kevin Moreau is the Managing Director for EMEA at Unitrends. The company recently announced its expansion into Europe so it was a perfect time to talk with Moreau about …
Hacker to business owner: Spotting innate talent in others
There has been much debate recently in the UK about the current GCSE exam format. On the one side are those that argue it should be scrapped in favour of a complex testing …
Wolfgang Kandek presents new Qualys offerings
During RSA Conference 2013 in San Francisco, presented several news announcements. In this video, Qualys CTO Wolfgang Kandek discusses the expanded FreeScan service, the …
The SCADA security challenge
One of the less well-known aspects of information technology – but arguably one of the most critical to modern businesses – is the SCADA platform. SCADA stands for …
The Chinese time bomb
At Seculert, when we analyze a targeted attack, we are trying to help our customers understand the intention of the attackers, as we look how the attack evolves over time. In …
Open standards are key for security in the cloud
The current divide between proprietary and open approaches to enterprise cloud computing has implications beyond the obvious. More than just issues of cloud interoperability …
IT complexity and change auditing
Robert Bobel is the Director of Product Management at NetWrix. In this interview he talks about change auditing trends, enterprise security issues, increasing IT complexity …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)