Please turn on your JavaScript for this page to function normally.
Lessons learned from RSA Conferences

In this video, Philippe Courtot, the Chairman and CEO of Qualys, offers insight into the past and present of the RSA Conference. He talks about how it has been growing and how …

Q&A: Google hacking

Robert Abela is a Technical Manager at Acunetix and in this interview he discusses the importance of Google for security research, provides tips on Google for information …

Q&A: Malware analysis

Greg Hoglund is the CEO and Founder of HBGary. He has been a pioneer in the area of software security. After writing one of the first network vulnerability scanners, he …

Q&A: InfoSec World Conference

Dina Dvinov is the Conference Marketing Manager at the MIS Training Institute and in this interview discusses the InfoSec World Conference. Introduce InfoSec World Conference …

Backup WordPress automatically with Backupify

You backup your computer, but do you backup your online activities? The typical Internet user nowadays uses a variety of services such as Flickr or Twitter, runs a WordPress …

Q&A: SOURCE Conference

Stacy Thayer is the Founder and Executive Director of SOURCE Conferences. Prior to founding SOURCE Conferences, Stacy was employed for a Fortune 500 company, where she worked …

Cybercriminals focus on targeted attacks

When it comes to computer security, bad news usually follows even the rare positive statistic. In their latest report, Websense note that they’ve seen the number of …

Q&A: Hackers and experimental artists

The “Noise vs. Subversive Computing” project is a collaborative release between noise and experimental artists working with subversive technologists and computer …

Adobe hacked, China to blame

In what seems to be normal news this week, Adobe became a victim of what the company is calling “a sophisticated, coordinated attack” and is actively investigating …

Google hacked, plans to leave China

Although it does face a variety of cyber attacks on a regular basis, Google recently acknowledged the theft of intellectual property following a sophisticated attack on their …

Q&A: Cyber threats

Mohd Noor Amin is the Chairman of IMPACT and heads the world’s largest public-private partnership against cyber threats. In this interview, he discusses the issues …

Q&A: Security testing methodologies

Jon Clay is the Senior Core Technology Marketing Manager at Trend Micro and in this interview he discusses current testing methodologies in the security industry, their good …

Don't miss

Cybersecurity news