Please turn on your JavaScript for this page to function normally.
Q&A: Government Security and Mobile Devices

Joseph Hagin is the Former Deputy White House Chief of Staff. In that role he had a high-level of concern about hacking and other security concerns related to …

Towards Kerberizing Web Identity and Services

Today authentication and authorization are addressed in an incoherent, and often site-specific, fashion on the Internet and the Web specifically. This situation stems from …

Applied Binary Code Obfuscation

An obfuscated code is the one that is hard (but not impossible) to read and understand. Sometimes corporate developers, programmers and malware coders for security reasons, …

Q&A: RSA Conference 2009

Sandra Toms LaPedis, Area Vice President and General Manager of RSA Conferences, is responsible for global promotion and successful execution, including strategy, brand …

What the Heartland Data Breach Tells Us

The recent data breach at Heartland Payment Systems should make one thing clear: the standards for security around credit card numbers still aren’t good enough. New …

Code Review or WAFs? PCI 6.6

Short answer: both. Compliance with requirement 6.6 of the PCI DSS cites the use of either a web application firewall (WAF) or code review. It’s far more effective to …

Protecting SOA Against Internal Attacks

It is critical to have a good understanding of the data flow in order to select the optimal protection approach at different points in the enterprise. By properly …

Q&A: Current Security Threats

Simon Heron is an Internet Security Analyst at Network Box, a managed security company, where he is responsible for developing the overall business strategy and growth. In …

Web Application Firewalls and PCI DSS

We all know that time is a critical factor in selecting solutions to prevent breaches. Web Application Firewalls (WAF) are the most effective mechanisms to immediately address …

Tackling the authentication nightmare

In the new edition of the HNS podcast, Jonathan Craymer, chairman of GrIDsure talks about tackling the authentication nightmare by getting the right balance between security …

Q&A: InfoSec World Conference and Expo

Jean Hey serves as Vice President of Conferences for MIS Training Institute. In this capacity she has been responsible for over 100 conferences, many of which focus on …

SIEM: the Answer to Awkward Security Questions

What’s the one security question that you don’t want to be asked about your company? I believe it’s the same question that Her Majesty the Queen raised when …

Don't miss

Cybersecurity news