Expert analysis
Identity Management for the cloud: Taking the next step
Identity and Access Management (IAM) in its present do a pretty good job dealing with internal users and systems. Unfortunately, that isn’t what most companies really …
Q&A: Cyber warfare
Geoff Harris is the President of the UK Chapter of the Information Systems Security Association (ISSA) a not-for-profit, international organization of information security …
Hacking Web 2.0 JavaScript: Reverse engineering, discovery and revelations
Today, applications are becoming increasingly dependent on the Internet as a foundation platform. As the application domain increases worldwide, the variety of web content …
Web application security issues and solutions
In this video, recorded at RSA Conference 2010, Mandeep Khera from Cenzic talks about web application security issues and solutions. He focuses on the fact that most web …
Closing the last door
There’s always a risk of viruses lurking behind links on a website. Even well-known sites can contain dangerous links, especially those with a high level of public …
Fighting Web flaws is futile
Do you ever find yourself driving down the road in an unfamiliar place and you get that gut feeling that you’re headed in the wrong direction? Well, I feel that’s …
Advice on securing Web applications
In this podcast, Cenzic’s Mandeep Khera talks about the latest trends in Web application security. According to their latest report, 80 percent of published …
Cloud computing security: An insider’s view
As CSO of Qualys, Randy Barr is responsible for security, risk management and business continuity planning of the QualysGuard platform. In this video Randy talks about cloud …
Unlike popular belief, short links on Twitter aren’t malicious
Twitter recently announced that it has implemented a new security system to scan all URLs posted in tweets to protect users from malicious sites. This follows a similar …
A closer look at Steganos Safe
Steganos Safe creates a password-protected virtual safe to store your photos, music, documents, and more. It also shreds unwanted files permanently and defeats data recovery …
15 years of Infosecurity Europe
In this podcast, Laura Heather, Marketing Manager for Infosecurity Europe gives an update on this year’s event, which will be opening its doors on the 27th of April in …
What’s your SEO poison?
Search engine optimization (SEO) poisoning is an increasingly popular method of attack for cybercriminals and one that shows they are using more sophisticated techniques. In …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services