Expert analysis
Advanced persistent threats, cloud security and mobile security to dominate RSA Conference Europe 2011
This is an interview with Linda Lynch, RSA Conference Europe Manager and Herbert “Hugh” Thompson, Ph.D, Chief Security Strategist, People Security and RSA …
New Ovum Technology report: Secunia VIM
How do companies operating diverse and wide-ranging systems solve their vulnerability management challenges? Not by using ad hoc tools, according to the new Ovum Technology …
Strong security is just common sense
For many years those who concerned themselves with an organization’s cyber security warned of threats, both internal and external, urging organizations to adequately …
SecurityByte: Cyber conflicts, cloud computing and printer hacking
Located twenty kilometers south of the city of Bangalore, Electronic City is the Indian version of Silicon Valley. Ever since the first phase of the project was finalized, the …
Video: SecurityByte Conference 2011
SecurityByte 2011 is India’s largest security conference. The event features over 30 talks with 3 parallel tracks, challenging War games and thought-provoking panel …
SecurityByte: India’s largest security conference
Nishchal Bhalla is the founder of SecurityByte Conference as well as security companies SD Elements and Security Compass. In this interview, he introduces India’s …
Next generation security as a service
In this video recorded at Black Hat 2011 in Las Vegas, Sumedh Thakar, Vice President of Engineering at Qualys, talks about QualysGuard Web Application Scanning (WAS) 2.0, the …
Have you been hacked this month?
I’m assuming the majority of people are sitting smugly reading this thinking “of course I haven’t!’ You do everything you’re supposed to do, …
Digital forensics: The inside story
Jelle Niemantsverdriet is the Principal Consultant, Forensics and Investigative Response EMEA, Verizon Business Security Solutions. In this interview he introduces the reader …
P25 security mitigation guide
In a recent research paper [pdf], we analyzed the security features of the APCO Project 25 (P25) digital two-way radio system. P25 radios are widely deployed in the United …
Testing the cloud
Managing IT networks requires a broad set of competencies in a growing number of technologies and products. It therefore makes sense that these competencies are centralized in …
Power to the people: Securing consumerized devices
The consumerization genie is out of the bottle. Employees are increasingly using consumer-focused websites and apps such as Twitter, Facebook and LinkedIn for work-related …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous