Expert analysis
Verizon Business data breach investigations report 2011: 8 days a week
What can be learned from the investigation into successful data breaches? What are the latest trends and techniques used by attackers? Get a front row seat at the breach cases …
Patching strategies
Cybercriminals have initiated an arms race by refining the malware manufacturing and development process to systematically bypass defense mechanisms. There are many …
Using online advertising to find out if your data is valuable to a criminal
As it becomes harder for criminals to steal and exploit credit card data, will they give up their carefully crafted tools and stock of zero-day vulnerabilities, or will they …
SSL Labs launches two Convergence notaries
Convergence is Moxie Marlinspike‘s attempt to introduce fresh thinking into the debate about PKI, certificate authorities, and trust. A hint of what was in the works was …
Towards secure tokenization algorithms and architectures
Tokenization – the use of surrogate values for sensitive data – is all the rage. Although it is often sold as an alternative to encryption, it is at the core a …
Advanced persistent threats, cloud security and mobile security to dominate RSA Conference Europe 2011
This is an interview with Linda Lynch, RSA Conference Europe Manager and Herbert “Hugh” Thompson, Ph.D, Chief Security Strategist, People Security and RSA …
New Ovum Technology report: Secunia VIM
How do companies operating diverse and wide-ranging systems solve their vulnerability management challenges? Not by using ad hoc tools, according to the new Ovum Technology …
Strong security is just common sense
For many years those who concerned themselves with an organization’s cyber security warned of threats, both internal and external, urging organizations to adequately …
SecurityByte: Cyber conflicts, cloud computing and printer hacking
Located twenty kilometers south of the city of Bangalore, Electronic City is the Indian version of Silicon Valley. Ever since the first phase of the project was finalized, the …
Video: SecurityByte Conference 2011
SecurityByte 2011 is India’s largest security conference. The event features over 30 talks with 3 parallel tracks, challenging War games and thought-provoking panel …
SecurityByte: India’s largest security conference
Nishchal Bhalla is the founder of SecurityByte Conference as well as security companies SD Elements and Security Compass. In this interview, he introduces India’s …
Next generation security as a service
In this video recorded at Black Hat 2011 in Las Vegas, Sumedh Thakar, Vice President of Engineering at Qualys, talks about QualysGuard Web Application Scanning (WAS) 2.0, the …
Featured news
Resources
Don't miss
- Microsoft May 2026 Patch Tuesday: Many fixes, but no zero-days
- Stealthy hackers exploit cPanel flaw in active backdoor campaign (CVE-2026-41940)
- Amazon Quick authorization bypass let users reach blocked AI chat agents
- Download: The IT and security field guide to AI adoption
- JetBrains TeamCity vulnerability allows privilege escalation, API exposure (CVE-2026-44413)