Please turn on your JavaScript for this page to function normally.
IronBee versus ModSecurity

After spending a couple of weeks talking about IronBee to anyone willing to listen, I have assembled a list of commonly asked questions. Not unexpectedly, the question that …

Penetration testing and certification

Stephen Sims works at Wells Fargo in San Francisco as a security architect and is a certified instructor for the SANS Institute. In this interview he discusses the …

The fundamental failure of endpoint security

According to Stefan Frei, Research Analyst Director with Secunia, it’s not the vulnerabilities in Microsoft’s products we should worry about, but those in …

Evaluate the effectiveness of your cyber armor

When evaluating our effectiveness in dealing with cyber defense, we have two layers of uncertainty and risk: how effectively are we protecting critical information, and what …

SANS Secure Europe training

Gareth Dance is the Manager EMEA for the SANS Institute. In this interview he discusses the SANS Secure Europe Amsterdam 2011 training event and offers insight into what …

Security considerations bring Software-plus-service and Software as a Service to the enterprise

Software-plus-service (S+S) and Software-as-a-service (SaaS) are next-generation software solutions for a number of today’s applications. Implementation flexibility, …

Vulnerability scanning and research

Cristian Florian is a product manager at GFI Software in charge of GFI LANguard, a network security scanning and patch management solution. In this interview he discusses …

Securing the enterprise: Insight from Qualys

In this video, recorded at RSA Conference 2011 in San Francisco, Qualys Chairman and CEO Philippe Courtot talks about the myriad of innovations coming from the company: Next …

The complex world of endpoint security

Jeff Melnick is a Sales Engineer at NetWrix Corporation and in this interview discusses the intricate world of endpoint security, offers tips for IT security managers dealing …

Do I need a data center?

If you still own your own data center and this question has not already crossed your mind, then you might be spending more money than you need, subjecting your organization to …

Critical data exchange in the cloud

The pace of business today requires that critical information can be accessed anywhere, anytime. Furthermore, this sharing of information often happens amongst both internal …

Secunia’s role in vulnerability management

In the video below, Secunia CSO Thomas Kristensen talks about the company and their product line. Kristensen tackles the following questions: Tell us more about Secunia, and …

Don't miss

Cybersecurity news