Please turn on your JavaScript for this page to function normally.
How to protect your company from social engineering attacks

Jayson E. Street is the Chief Infosec Officer at Stratagem 1 Solutions, the author of the book Dissecting the hack: the f0rb1dd3n network and a well-known information security …

L0phtCrack 7: The next level of password auditing and recovery

L0phtCrack is one of the most used tools by security professionals worldwide. After years of inactivity, version 6 was released in 2009 and development hasn’t halted …

The world of security on center stage at RSA Conference 2011

Sandra Toms LaPedis, Area Vice President and General Manager of RSA Conferences, is responsible for global promotion and successful execution for the conference. In this …

Inside the mind of a computer forensics investigator

Jess Garcia, founder of One eSecurity, is a senior security engineer and an active security researcher in areas of incident response, computer forensics and honeynets. In this …

Smart grid security facts

Tony Flick has worked for over eight years in the security industry and is currently a Principal with Tampa-based FYRM Associates. He has presented at Black Hat, DEF CON, …

Cloud security risks, benefits and cost savings

Harold Moss is the Emerging Tech & Cloud Computing Technical Architect, IBM Security Strategy. In this interview he talks about the security of cloud service providers, …

Wireless security considerations

Brad Haines is chief researcher of Renderlab.net and a noted expert in the field of wireless security. Brad has spoken at many international conferences and taught several …

Past, present and future of Metasploit

HD Moore is the CSO at Rapid7 and Chief Architect of Metasploit, an open-source penetration testing platform. HD founded the Metasploit Project with the goal of becoming a …

Current threats and the evolution of cybercrime

Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is actively involved with SANS working with students, teaching, and maintaining and developing …

Weather forecast: Cloudy with a chance of compliance

If there are constants to every information security conference, they are these: threats are up and the job of the average security professional becomes more demanding every …

Best practices in approaching vendor risk assessment

When it comes to vendor risk assessment, a one-size-fits-all approach is not the way to go. Every vendor you bring into your organization will add its own unique set of risks …

How to become a published author in information security

A large security event is always filled with exceptionally clever attendees who are writers in one way or another. Some produce training materials for their employers, others …

Don't miss

Cybersecurity news