Please turn on your JavaScript for this page to function normally.
Q&A: Splunk

In this interview the Splunk team discusses Splunk in detail. What is Splunk? Splunk was born from its founders’ frustration in running some of the worlds largest IT …

BruCON: Hackers descend on Belgium

After visiting several computer security events and being impressed by the energy and the open exchange of knowledge, a small group of people dreamed of creating a hacker …

Dissecting the hack: the f0rb1dd3n network

In this video, recorded last week at BruCON, Jayson Street talks about his book – “Dissecting the hack: the f0rb1dd3n network” – published by Syngress. …

Photos: BruCON conference, part 2

Help Net Security editor-in-chief Mirko Zorz is attending BruCON and besides Tweeting via our main account (@helpnetsecurity), he is right now recording a series of videos, as …

Q&A: Information assurance

Ravinderpal “Ravi” Sandhu is The University of Texas at San Antonio (UTSA)’s Lutcher Brown distinguished chair in cyber security and the executive director …

1Password Windows
Q&A: 1Password

Carl Slawinski is the Chief Evangelist for Agile Web Solutions, the company behind 1Password, a hugely popular Mac software title. In this interview he takes us down memory …

Q&A: SQL injection

Justin Clarke is a co-founder and Director at Gotham Digital Science. He has over twelve years of experience in assessing the security of networks, web applications, and …

Q&A: Enterprise threats and compliance

John Viega is the CTO, Software-as-a-Service, at McAfee. John is author of many security books and is responsible for numerous software security tools and is the original …

Q&A: PCI compliance

Jim Bibles is a Product Manager at Qualys currently directing the development and enhancement of the company’s QualysGuard PCI solution. His security background ranges …

Q&A: Penetration testing

Thomas Wilhelm is an associate professor at Colorado Technical University and also employed at a Fortune 20 company performing penetration testing and risk assessments and has …

Q&A: OSSEC, the open source host-based intrusion detection system

Daniel B. Cid is the founder of the open source OSSEC HIDS and a principal researcher at Trend Micro. He has a special interest in intrusion detection, log analysis and secure …

Q&A: Vulnerability management

Eric Perraudeau is the product manager for QualysGuard vulnerability management (VM) solutions. Prior to Qualys, Eric was a security engineer at Accor and Morse in France. In …

Don't miss

Cybersecurity news