Please turn on your JavaScript for this page to function normally.
SANS London 2011 training

Andrew Smith is the Managing Director, EMEA, for the SANS Institute. In this interview he discusses the SANS London 2011 training event and offers insight into what exactly …

Demystifying cloud computing security

Phil Neray is the VP, Data Security Strategy, InfoSphere Guardium & Optim at IBM. In this interview Phil talks about the complex issues surrounding cloud computing …

How well do you know SSL?

Ivan Ristic, the Director or Engineering at Qualys, talks about the research done by SSL Labs. SSL Labs is a collection of documents, tools and thoughts related to SSL. …

Back to the future: Why IT managers should care about firewall management

A number of classic scenes in film and literature involved a group approaching a walled city or castle only to be stopped by a gatekeeper and asked, “Halt, who goes …

Verizon Business data breach investigations report 2011: 8 days a week

What can be learned from the investigation into successful data breaches? What are the latest trends and techniques used by attackers? Get a front row seat at the breach cases …

Patching strategies

Cybercriminals have initiated an arms race by refining the malware manufacturing and development process to systematically bypass defense mechanisms. There are many …

Using online advertising to find out if your data is valuable to a criminal

As it becomes harder for criminals to steal and exploit credit card data, will they give up their carefully crafted tools and stock of zero-day vulnerabilities, or will they …

SSL Labs launches two Convergence notaries

Convergence is Moxie Marlinspike‘s attempt to introduce fresh thinking into the debate about PKI, certificate authorities, and trust. A hint of what was in the works was …

Towards secure tokenization algorithms and architectures

Tokenization – the use of surrogate values for sensitive data – is all the rage. Although it is often sold as an alternative to encryption, it is at the core a …

Advanced persistent threats, cloud security and mobile security to dominate RSA Conference Europe 2011

This is an interview with Linda Lynch, RSA Conference Europe Manager and Herbert “Hugh” Thompson, Ph.D, Chief Security Strategist, People Security and RSA …

New Ovum Technology report: Secunia VIM

How do companies operating diverse and wide-ranging systems solve their vulnerability management challenges? Not by using ad hoc tools, according to the new Ovum Technology …

Strong security is just common sense

For many years those who concerned themselves with an organization’s cyber security warned of threats, both internal and external, urging organizations to adequately …

Don't miss

Cybersecurity news