Expert analysis
Q&A: Web application security testing
As the CTO and VP of Engineering at Cenzic, Lars Ewe has a broad background in (web) application development and security. In this interview he discusses issues related to web …
Security on a shoestring
Whenever information security is mentioned within most organizations there is a collective groan; the board don’t want to engage, staff don’t want to be encumbered …
Q&A: Cisco Secure Borderless Networks
Shalabh Mohan is the Director, Product Management, Cisco STBU. He manages the firewall, VPN, and Web security businesses with a focus on secure mobility. In this interview he …
The cloudy world of passwords
With the growth of social networking, online media consumption and cloud computing, every day millions of people log in to a variety of different sites using a username and …
Understanding social engineering
At the heart of many of the malicious ploys that we see online is one underlying concept: social engineering. Deceptive social engineering tactics are interwoven throughout …
Lessons learned from RSA Conferences
In this video, Philippe Courtot, the Chairman and CEO of Qualys, offers insight into the past and present of the RSA Conference. He talks about how it has been growing and how …
The smart grid, it’s all about security
All too often you read about security breaches that cost firms millions of dollars or hit individuals with loss of personal data or both. But all this pales in comparison when …
Does Web 2.0 need Web security 2.0?
Web 2.0 is thriving, and so too are applications that take advantage of this technology. Interactive sites like LinkedIn, Twitter and even company websites are becoming ever …
Q&A: Google hacking
Robert Abela is a Technical Manager at Acunetix and in this interview he discusses the importance of Google for security research, provides tips on Google for information …
It’s time to embrace the shift to the cloud
The software industry is entering another age of astonishing innovation. It’s a time when not only software is advancing at a fast pace, but so too are hardware devices …
An introduction to virtualization security
Virtualization platforms are software. All software has flaws. Therefore, virtualization platforms have flaws. Simple logic, right? The major virtualization platform vendors, …
The cloud is changing how IT delivers services
Need a pair of shoes? Or an airline ticket? Or a book? Or 100 servers to get you through the holiday online sales rush? No problem. Go online and your needs are (nearly) …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month