conferences
RSA Conference 2015: Showcasing the future of information security
Linda Gray is the General Manager of RSA Conferences. In this interview she talks about the growth of RSA Conference, outlines the threats that helped shape this year’s …
RSA Conference 2015: Challenging today’s security thinking
RSA Conference, the premiere series of global events, will once again set the stage for the world to talk – and challenge – information security trends for 2015, …
INTERPOL World 2015 expects high-level international participation
More than 70 percent of the exhibition space for INTERPOL World, a new international security event taking place from 14-16 April 2015 in Singapore, has been booked by key …
Photo gallery: McAfee FOCUS 14
Help Net Security attended McAfee’s Annual Security Conference FOCUS 14 that has been held this week at The Venetian and the Palazzo Congress Center in Las Vegas. …
INTERPOL World launches partners program
INTERPOL World has launched a Strategic Partners Program with private-sector security solutions providers to jointly create solutions to real-world security challenges faced …
A walk through Cyber Security EXPO 2014, part two
Co-located with IP EXPO Europe, a cloud and IT infrastructure event, Cyber Security EXPO is taking place this week in London. Help Net Security is at the event, and …
A walk through Cyber Security EXPO 2014
Co-located with IP EXPO Europe, a cloud and IT infrastructure event, Cyber Security EXPO is taking place this week in London. Help Net Security is at the event, and …
Discover Cyber Security EXPO
In this interview, Mark Steel, CEO at IP EXPO Europe, talks about Cyber Security EXPO, taking place October 8-9 in London. This is the very first Cyber Security EXPO. How …
Cyber Security EXPO: Who, what and when
In today’s complex and always-connected world, attackers can exploit an increasing number of entry points to inflict damage to companies and individuals. With more and …
Why open source and collaboration are the future of security
In this podcast recorded at Black Hat USA 2014, Greg Martin, CTO at ThreatStream, talks about why open source and collaboration are the key drivers of information security …
Malicious and risky apps on Android and iOS
Knowingly or unknowingly to the user, some apps can collect GPS data, grab your contact information, your phone ID, email address, etc. In this podcast recorded at Black Hat …
Lessons learned from running 95 bug bounty programs
Large companies such as Google and Facebook have dedicated teams that review bug submissions, verify valid bugs and reward security researchers, but that can be time and …