Expert analysis
The current challenges of being a CISO
In the last decade or so, the role of Chief Information Security Officer (CISO) was established in the great majority of business, government and non-profit organizations, and …
Android security from the ground up
Georgia Weidman is a penetration tester, security researcher, and trainer. She’s also one of the speakers at the upcoming HITBSecConf 2012 Amsterdam conference. In this …
Securing SharePoint
Microsoft SharePoint enables information sharing and report publishing. It also provides a search facility for users to find content. The problem is that, all too easily, any …
Hardening the endpoint operating system
Qualys CTO Wolfgang Kandek, talks about the effects of hardening the endpoint operating system and improving the resilience against common attacks. As the CTO for Qualys, …
VolP: The new way in?
Voice is now data and as such it is a new attack vector for hackers into a company network. Most VoIP systems being deployed are based on Session Initiation Protocol (or SIP) …
Multifunction printer hacking
A great number of multifunction printers of have the ability to integrate within a corporation’s business environment and connect to its email systems, its file systems, …
Removing risk from network and security change management
“There is nothing wrong with change, if it’s in the right direction,” said Winston Churchill. But speak to a hard-pressed CSO or CIO, and they’ll tell …
Encryption and key management as strategic business issues
Encryption is now viewed as a strategic issue with business leaders gaining greater influence over their organization’s encryption strategy, according to Richard Moulds, …
Amphion Forum, a security event to watch
Kurt Stammberger is the VP of Market Development at Mocana and the Chair of the Amphion Forum. He is best known as the founder of the annual RSA Conference. He joined RSA …
Video: RSA Conference 2012 showcase
The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2012. Here’s a closer look at the show. For …
The future of attacks on banking systems
If you’re a regular reader of our news site – or, indeed, any other that site that deals with information and computer security – you might sometimes get the …
Video: Trustworthy Internet Movement Initiative
During his keynote at RSA Conference 2012, Philippe Courtot, Chairman and CEO at Qualys, addressed issues facing the entire information security industry. Courtot also …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)