Please turn on your JavaScript for this page to function normally.
Next generation security as a service

In this video recorded at Black Hat 2011 in Las Vegas, Sumedh Thakar, Vice President of Engineering at Qualys, talks about QualysGuard Web Application Scanning (WAS) 2.0, the …

Digital forensics: The inside story

Jelle Niemantsverdriet is the Principal Consultant, Forensics and Investigative Response EMEA, Verizon Business Security Solutions. In this interview he introduces the reader …

Microsoft offers $250,000 reward for botnet information

Microsoft decided to extend their efforts to establish the identity of those responsible for controlling the Rustock botnet by issuing a $250,000 reward for new information …

Email archiving challenges

Brian Azzopardi is the product manager for GFI MailArchiver. In this interview he discusses the challenges related to managing email growth and how archiving can help. Why …

Securing the virtual environment

In this video, Dimitri McKay, Security Architect at LogLogic, talks about vulnerabilities and the security challenges surrounding virtual environments: hyperjacking, VM …

The complex information security landscape

In this interview, Latha Maripuri, Director, IBM Security Services and Marc van Zadelhoff, Director of Strategy, IBM Security Solutions, discuss the increasingly complex …

Application security vulnerabilities

Rafal Los, Application Security Evangelist at HP Software, talks about application security vulnerabilities at the logic level. The inner-workings of an application can only …

Social media threats and targeted attacks

In the video below, Alexandru Catalin Cosoi, the Head of Online Threats Lab at BitDefender, talks about the new breed of social media threats and sophisticated targeted …

Security auditing tools and challenges

James Tarala is a principal consultant with Enclave Security. He is a regular speaker and senior instructor with the SANS Institute as well as a courseware author and editor …

Web application security trends and issues

In this podcast, Mandeep Khera from Cenzic talks about web application security trends and issues. Web applications are the weakest link in the security chain – and it …

How secure is your browser?

Qualys CTO Wolfgang Kandek talks about research which clearly shows that browser security is alarmingly bad. Browsers and plug-ins are frequently outdated and easily attacked. …

RSA breach: Reactions from the security community

RSA, the security division of EMC, has suffered a breach and data loss following an “extremely sophisticated cyber attack.” Their investigation revealed that the …

Don't miss

Cybersecurity news