Please turn on your JavaScript for this page to function normally.
The importance of secure coding

Jim Manico is the VP of Security Architecture for WhiteHat Security. In this video recorded at Hack In The Box 2013 Amsterdam, Manico illustrates the importance of secure …

Why wiping decommissioned IT assets should be a must

Last week I’ve written about the ways confidential data can leak outside the organization if the IT security team doesn’t pay attention to printers, shredders, or …

How secure is your confidential data?

It seems ages ago that companies were first warned about the danger of confidential information being found in trash bags in front of the office, yet despite the use of …

Cloud storage and sharing with MediaFire

MediaFire is a cloud storage service that enables you to store and share data. Read on to discover is features and learn how well it works.

A closer look at Hack In The Box 2013 Amsterdam

Here’s a look at Hack In The Box 2013 Amsterdam, that took place at the Okura Hotel on April 10-11. This year’s event is going to be remembered by the widely …

Twitter wisdom: April 9, 2013

Here’s food for thought from people you should be following on Twitter. Actually it strikes me dentistry and infosec are similar. We both breach prevention better than …

SCADA security

Amol Sarwate is the Director of Vulnerability Labs at Qualys. In this video, recorded at RSA Conference 2013, Sarwate introduces SCADA security.

The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win

As I've always worked at small companies, I've been fascinated by the politics and problems experienced by those working for larger organizations. Surviving and thriving in …

Infosec Twitter wisdom: March 27, 2013

Here’s food for thought from people you should be following on Twitter. People don’t get why Inception was such a profoundly great movie. It’s a story where …

Hacking for good: Kickstart a documentary about hackers in Uganda

While the information security community is largely accustomed to the term “hacking” being used to describe criminal computer activity in the mainstream media, …

The data backup and disaster recovery market

Mike Coney is the President and CEO of Unitrends, a provider of data backup and disaster recovery solutions. In this podcast, recorded at RSA Conference 2013, Coney talks …

Infosec Twitter wisdom: March 22, 2013

Here’s food for thought from people you should be following on Twitter. An IP address is not a smoking gun. — Dave Lewis (@gattaca) March 21, 2013 There’s no …

Don't miss

Cybersecurity news