Expert analysis
Patching challenges and techniques
Wolfgang Kandek is the CTO and Vice President of Engineering at Qualys. In this interview he discusses Microsoft security bulletins, patching difficulties in general, patching …
The real ROI of software security activities
At a time when IT budgets are closely examined for cuts that can be lived with, a survey among senior executives of 17 companies (including Fortune 500 companies) across the …
SANS London: Europe’s most extensive security training event
Terry Neal is the Director EMEA of the SANS Institute. In this interview he discusses SANS London 2010 training event in detail. Terry introduces the courses, the instructors …
Large scale study of SSL configurations
Ivan Ristic is the director of engineering at Qualys and principal author of ModSecurity, the open source web application firewall. In this podcast, Ivan talks about the …
A closer look at Knox for Mac
Knox (v. 2.0.5) is a Mac application that will allow you to create password-protected and encrypted vaults on your computer or to turn an external drive into one in order to …
How to block Flash in Safari
I have been a satisfied Mac user for quite some time now. What I really love about Macs is that they just work. When you spend 10+ hours a day on your computer, you need for …
Security exercise for information infrastructure protection
“Cyber Europe 2010” – the first pan European CIIP (Critical Information Infrastructure Protection) exercise that will test the efficiency of communication …
How to cut costs and still remain secure
You’ve just heard your budgets have been cut once again! This time it’s across all IT and security has got to be slashed too. As a CISO or IT manager, or indeed a …
Are your organisation’s secrets actually secret?
If we look back over recent years, organizations quickly established databases for storing information and, with them, ways to mine these records to squeeze as much …
Sangria, tapas and hackers: SOURCE Barcelona 2010
I am writing this report sitting in an airplane on the tarmac of the Barcelona airport waiting for the traffic controller to give us the green light for departure. There are …
Today’s security landscape: Threats, data breaches and privacy
In this video recorded at the IBM Innovate 2010 conference, Jack Danahy, the Worldwide Security Executive, IBM/Rational at IBM, talks about current threats, data breaches and …
Vulnerability research and disclosure
Richard Brain is the Technical Director at ProCheckUp and in this interview he discusses vulnerability research, his favorite security tools, fuzzing as well as the …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025