Expert analysis
Removing risk from network and security change management
“There is nothing wrong with change, if it’s in the right direction,” said Winston Churchill. But speak to a hard-pressed CSO or CIO, and they’ll tell …
Encryption and key management as strategic business issues
Encryption is now viewed as a strategic issue with business leaders gaining greater influence over their organization’s encryption strategy, according to Richard Moulds, …
Amphion Forum, a security event to watch
Kurt Stammberger is the VP of Market Development at Mocana and the Chair of the Amphion Forum. He is best known as the founder of the annual RSA Conference. He joined RSA …
Video: RSA Conference 2012 showcase
The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2012. Here’s a closer look at the show. For …
The future of attacks on banking systems
If you’re a regular reader of our news site – or, indeed, any other that site that deals with information and computer security – you might sometimes get the …
Video: Trustworthy Internet Movement Initiative
During his keynote at RSA Conference 2012, Philippe Courtot, Chairman and CEO at Qualys, addressed issues facing the entire information security industry. Courtot also …
Shaping the future of information security
Once again, the Innovation Sandbox proved to be one of the most interesting events at RSA Conference 2012, as ten creative companies got a moment in the spotlight to present …
Interview with Joe Sullivan, CSO at Facebook
Joe Sullivan is the Chief Security Officer at Facebook, where he manages a small part of a company-wide effort to ensure a safe internet experience for Facebook users. He and …
What is ISO 27001?
Learn the basics of information security and how to use ISO 27001 as a framework for managing information security management system. For more information and training, check …
Open source tool detects videoconferencing equipment vulnerabilities
Videoconferencing equipment has been in the news recently for its potential for use by attackers to snoop on confidential company meetings, view charts mounted on meeting room …
Why is residual risk so important?
The term “residual risk’ is mandatory in the risk management process according to ISO 27001, but is unfortunately very often used without appreciating the real …
Wireless security and the enterprise
Jesse Frankel is the head of the AirMagnet Intrusion Research Team. He has been working in various areas of wireless LAN technology and applications for more than 15 years. …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025