Berislav Kucan
Product pitch: Entrust IdentityGuard
In this podcast, Mike Moir, Product manager with Entrust, talks about Entrust IdentityGuard, an award-winning software authentication platform that helps financial …
LOK-IT Secure Flash Drive
After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based …
Video: InfoSec World Conference & Expo 2012
Taking place in Orlando, Florida, the primary objective of InfoSec World is providing education to all levels of information security and IT auditing professionals. Help Net …
How to do BYOD the right way
The massive proliferation of mobile devices and the employees’ tendency to prefer using devices they chose themselves has created quite a conundrum and challenges for …
Multifunction printer hacking
A great number of multifunction printers of have the ability to integrate within a corporation’s business environment and connect to its email systems, its file systems, …
Encryption and key management as strategic business issues
Encryption is now viewed as a strategic issue with business leaders gaining greater influence over their organization’s encryption strategy, according to Richard Moulds, …
Shaping the future of information security
Once again, the Innovation Sandbox proved to be one of the most interesting events at RSA Conference 2012, as ten creative companies got a moment in the spotlight to present …
New data encryption platform
CertiVox unveiled its PrivateSky Secure Information Exchange (SIX) platform. The service provides protection for email, files and other information sent via the cloud, through …
The challenges of setting up a security conference
In this podcast recorded at the SecurityByte conference held this year in Bangalore, India, the conference founder Nishchal Bhalla talks about his motivations for organizing …
The future of cybersecurity in cars
As technology evolves at a seemingly breakneck speed, we must be aware of the fact that the environments in which we find ourselves every day – environments that have in …
Cybercrime and Espionage
The authors, seasoned experts in the information security field with obvious intelligence insights, provide the readers with an interesting overview of the current biggest …
SecurityByte: Cyber conflicts, cloud computing and printer hacking
Located twenty kilometers south of the city of Bangalore, Electronic City is the Indian version of Silicon Valley. Ever since the first phase of the project was finalized, the …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments