Please turn on your JavaScript for this page to function normally.
New approach to SQL injection detection

In this podcast recorded at RSA Conference 2014, Dave Rosenberg, CTO at DB Networks, talks about a new approach to SQL injection detection and explains how they solve this …

The security of embedded devices

Embedded devices are everywhere and they make our lives more convenient, but from a security standpoint, they can be intimidating, especially if we’re talking about an …

Video: RSA Conference 2014 showcase

The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2014. Here’s a closer look at the show, watch …

Security awareness training: Why it matters

Dr. Peter Lokhorst is Managing Director of InfoSecure BV, which is currently in seven countries and provides awareness training programs to international clients including …

Exploring the complexity of modern cyber attacks

James Holley is an Executive Director at Ernst & Young LLP. In this interview he discusses the complexity of modern cyber attacks, the challenges involved in maintaining …

Knox: Mac file encryption and backup

Knox is a utility that enables you to create encrypted vaults on OS X. It's made by AgileBits, the company behind the popular password manager 1Password.

Social Media Security

I remember the days when social media was used exclusively by early adopters and technology buffs. Today, it's a firm part of our daily lives. Individuals use it to network …

Teaching children information security skills

In this interview, Julie Peeler, the Director of the (ISC)2 Foundation, discusses the biggest online threats to kids and provides tips on how to teach children to stay safe …

Tracking botnets using automatically generated domains

Stefano Zanero is an Assistant Professor at Politechnico di Milano, where he focuses on systems security. Modern botnets rely on domain-generation algorithms (DGAs) to build …

The Circle

The book talks about a near future where the most significant company in the world is The Circle. They don't deal in goods, but in what we all know is the real commodity of …

The future? Big data and intelligence driven security

As we produce and consume an increasing amount of digital data, even the casual user is becoming aware that the way we store and access this data will continue to shift and …

A primer on breaking game console security

Are you interested to learn about the delicate hacks and tricks that go on behind the curtains of the scene better known as the console hacking scene? In this podcast recorded …

Don't miss

Cybersecurity news