Please turn on your JavaScript for this page to function normally.
Wolfgang Kandek presents new Qualys offerings

During RSA Conference 2013 in San Francisco, presented several news announcements. In this video, Qualys CTO Wolfgang Kandek discusses the expanded FreeScan service, the …

Wide Open Privacy: Strategies For The Digital Life

We live in a digital age where it's become normal to see people post photos of their credit cards online, parents share on Facebook images of their newborns right from the …

IT complexity and change auditing

Robert Bobel is the Director of Product Management at NetWrix. In this interview he talks about change auditing trends, enterprise security issues, increasing IT complexity …

Video: RSA Conference 2013 showcase

The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2013. Here’s a closer look at the show. For …

How to successfully submit conference talks

There are many ways a security professional can increase his public profile, and one of these is speaking at a conference. However, getting your work accepted at an event is …

Windows 8 Inside Out

When Microsoft CEO Steve Ballmer launched Windows 8, he dubbed it a re-imagined operating system. When you introduce so many new features and a different UI, you're going to …

Social engineering: Clear and present danger

Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …

The privacy implications of Facebook Graph Search

With a billion people sharing an assortment of personal information on a daily basis, Facebook holds the most significant amount of private information in today’s …

Information risks in the enterprise

Ian Whiting is the CEO Titania, a developer of security auditing and testing software. In this interview he discusses managing information-related risks in the enterprise, …

High-risk Broadcom UPnP stack remote root vulnerability

Recently, DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. Further research revealed that the …

OS X Mountain Lion: The Missing Manual

With more than 200 new features in Mountain Lion, Apple has once again delivered a robust operating system that stays ahead of the curve. This immense book is here to help you …

Events that defined the European information security landscape in 2012

The past 12 months have been, to say the least, an active time for the information security landscape in Europe. Hacktivism stories dominated mainstream media outlets, the …

Don't miss

Cybersecurity news