Mirko Zorz
How to sell security to senior management
While companies know they have to invest in IT to do their jobs, IT security always ends up looking like an added cost in the eyes of the management. So, what are the things …
Application security: The good, the bad and the ugly
What is the actual state of application security today? Veracode has tested over 2,900 applications using it cloud-based platform, employing static and dynamic analysis (web …
Facebook: The rise of the privacy killer
Privacy should be a human right, and we should be able to see our data, challenge it, change it and delete it. Still, we’re not in charge of our personal information at …
The look and feel of RSA Conference Europe 2010
Held at the Hilton London Metropole hotel, this year’s European edition of the RSA Conference has gathered many security practitioners, enticed by the promise of an …
Developing a secure product lifecycle for Flash content
In this podcast recorded at the RSA Conference 2010 that started today in London, Peleus Uhley, Platform Security Strategist for Secure Software Engineering at Adobe talks …
Patching challenges and techniques
Wolfgang Kandek is the CTO and Vice President of Engineering at Qualys. In this interview he discusses Microsoft security bulletins, patching difficulties in general, patching …
The real ROI of software security activities
At a time when IT budgets are closely examined for cuts that can be lived with, a survey among senior executives of 17 companies (including Fortune 500 companies) across the …
SANS London: Europe’s most extensive security training event
Terry Neal is the Director EMEA of the SANS Institute. In this interview he discusses SANS London 2010 training event in detail. Terry introduces the courses, the instructors …
Large scale study of SSL configurations
Ivan Ristic is the director of engineering at Qualys and principal author of ModSecurity, the open source web application firewall. In this podcast, Ivan talks about the …
Sangria, tapas and hackers: SOURCE Barcelona 2010
I am writing this report sitting in an airplane on the tarmac of the Barcelona airport waiting for the traffic controller to give us the green light for departure. There are …
Today’s security landscape: Threats, data breaches and privacy
In this video recorded at the IBM Innovate 2010 conference, Jack Danahy, the Worldwide Security Executive, IBM/Rational at IBM, talks about current threats, data breaches and …
Vulnerability research and disclosure
Richard Brain is the Technical Director at ProCheckUp and in this interview he discusses vulnerability research, his favorite security tools, fuzzing as well as the …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security