Please turn on your JavaScript for this page to function normally.
Rising security threats in 2010

In this podcast, Roel Schouwenberg, Senior Anti-Virus Researcher for Kaspersky Lab, talks about rising security threats in 2010. Using the January attacks against Google and …

Open authentication standards and OATH

In this podcast, Siddharth Bajaj, Principal at Verisign Labs and Chair of the Joint Coordination Committee which leads the Initiative for OATH (Open AuTHentication), talks …

iPhone unlocking tricks get PCs into trouble

A malware-spreading mechanism targeting the “iPhone unlocking” fans goes to prove that cybercrime is never short of imagination. This is how the story goes: you …

Identity Management for the cloud: Taking the next step

Identity and Access Management (IAM) in its present do a pretty good job dealing with internal users and systems. Unfortunately, that isn’t what most companies really …

Q&A: Cyber warfare

Geoff Harris is the President of the UK Chapter of the Information Systems Security Association (ISSA) a not-for-profit, international organization of information security …

Hacking Web 2.0 JavaScript: Reverse engineering, discovery and revelations

Today, applications are becoming increasingly dependent on the Internet as a foundation platform. As the application domain increases worldwide, the variety of web content …

Web application security issues and solutions

In this video, recorded at RSA Conference 2010, Mandeep Khera from Cenzic talks about web application security issues and solutions. He focuses on the fact that most web …

Closing the last door

There’s always a risk of viruses lurking behind links on a website. Even well-known sites can contain dangerous links, especially those with a high level of public …

Fighting Web flaws is futile

Do you ever find yourself driving down the road in an unfamiliar place and you get that gut feeling that you’re headed in the wrong direction? Well, I feel that’s …

Advice on securing Web applications

In this podcast, Cenzic’s Mandeep Khera talks about the latest trends in Web application security. According to their latest report, 80 percent of published …

Cloud computing security: An insider’s view

As CSO of Qualys, Randy Barr is responsible for security, risk management and business continuity planning of the QualysGuard platform. In this video Randy talks about cloud …

Unlike popular belief, short links on Twitter aren’t malicious

Twitter recently announced that it has implemented a new security system to scan all URLs posted in tweets to protect users from malicious sites. This follows a similar …

Don't miss

Cybersecurity news