Please turn on your JavaScript for this page to function normally.
User activity monitoring crucial to minimizing security risks

In this ever evolving threat landscape, willing or unwitting insiders often play a key role in security compromises of organizations. It used to be that an …

Europe’s largest infosec training event

In this interview, Gareth Dance, Conference Director, EMEA, SANS Institute, talks about SANS Secure Europe 2012. How would you introduce SANS Secure Europe 2012 to someone who …

Penetration testing tips, tricks and unusual situations

Raul Siles is a senior security analyst with more than 10 years of expertise performing advanced security services. He is a SANS Institute author and instructor of penetration …

Complex security architectures and innovation

Martin Borrett is the Director of the IBM Institute of Advanced Security in Europe. He leads the Institute and advises at the most senior level in clients on policy, business, …

The current challenges of being a CISO

In the last decade or so, the role of Chief Information Security Officer (CISO) was established in the great majority of business, government and non-profit organizations, and …

Android security from the ground up

Georgia Weidman is a penetration tester, security researcher, and trainer. She’s also one of the speakers at the upcoming HITBSecConf 2012 Amsterdam conference. In this …

Hardening the endpoint operating system

Qualys CTO Wolfgang Kandek, talks about the effects of hardening the endpoint operating system and improving the resilience against common attacks. As the CTO for Qualys, …

VolP: The new way in?

Voice is now data and as such it is a new attack vector for hackers into a company network. Most VoIP systems being deployed are based on Session Initiation Protocol (or SIP) …

The evolution of malware and the threat landscape

The past 10 years represent a very interesting timeframe for reviewing vulnerability disclosures and ensuing changes that continue to affect risk management in IT …

Video: RSA Conference 2012 showcase

The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2012. Here’s a closer look at the show. For …

The future of attacks on banking systems

If you’re a regular reader of our news site – or, indeed, any other that site that deals with information and computer security – you might sometimes get the …

Video: Trustworthy Internet Movement Initiative

During his keynote at RSA Conference 2012, Philippe Courtot, Chairman and CEO at Qualys, addressed issues facing the entire information security industry. Courtot also …

Don't miss

Cybersecurity news