Expert analysis
It’s time to embrace the shift to the cloud
The software industry is entering another age of astonishing innovation. It’s a time when not only software is advancing at a fast pace, but so too are hardware devices …
An introduction to virtualization security
Virtualization platforms are software. All software has flaws. Therefore, virtualization platforms have flaws. Simple logic, right? The major virtualization platform vendors, …
The cloud is changing how IT delivers services
Need a pair of shoes? Or an airline ticket? Or a book? Or 100 servers to get you through the holiday online sales rush? No problem. Go online and your needs are (nearly) …
Video: RSA Conference 2010 showcase
In this RSA Conference 2010 video showcase, you can check out the look and feel of the event and the expo floor.
Introduction to Hacktics’ Seeker web application vulnerability scanner
At the RSA Conference 2010 Innovation Sandbox, we met up with Ron Porat, CEO of Hacktics and recorded a short podcast in which he introduces their flagship product Seeker. …
Introduction to Altor’s virtual firewall
Altor Networks has just been announced as the winner of RSA’s Innovation Sandbox “Most Innovative Company at RSA Conference 2010” contest. Listen to the …
Video: Innovation Sandbox at the RSA Conference 2010
Take a peek at the atmosphere at the Innovation Sandbox, a half-day event during which you could witness interactive white boarding sessions, ask the experts and whisper …
Q&A: Malware analysis
Greg Hoglund is the CEO and Founder of HBGary. He has been a pioneer in the area of software security. After writing one of the first network vulnerability scanners, he …
Security monitoring: Having vision for the future
Security attacks such as website hacking, security breaches and malware threats are all becoming increasingly common and sophisticated in design. The latest high-profile …
Q&A: InfoSec World Conference
Dina Dvinov is the Conference Marketing Manager at the MIS Training Institute and in this interview discusses the InfoSec World Conference. Introduce InfoSec World Conference …
A closer look at Comodo Dragon 1.0.0.5
Comodo Dragon is a recently released free Internet browser constructed on the open source Chromium Project browser. The installation process is simple and fast. You will be …
Undetected data breaches are the ones that hurt the most
File transfer technologies have been around for over 30 years, but recent evolutionary changes in business needs have resulted in significant improvements to file transfer …
Featured news
Sponsored
Don't miss
- How much does cloud-based identity expand your attack surface?
- Finding software flaws early in the development process provides ROI
- Zero-day exploitation surged in 2023, Google finds
- NHS Scotland confirms ransomware attackers leaked patients’ data
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)