Please turn on your JavaScript for this page to function normally.
Attacking SCADA wireless systems

Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …

Strategies of a world-class computer security incident response team

Today’s Computer Security Incident Response Team (CSIRT) should have everything they need to mount a competent defense of the ever-changing IT enterprise: a vast array …

Protecting sensitive information on iOS devices

We’ve seen the deep technical research showing what makes iOS devices secure (or sometimes not so much). But once you grok ASLR and code signing, are you really any …

Hacking as an act of war

Once the exclusive domain of a small number of geniuses, hacking has gone mainstream as an element of national defense. The United States has established a four-star Cyber …

Making a case for security optimism

Jeff Jones is a Director at Microsoft Trustworthy Computing. He works with enterprise CSOs and Microsoft’s internal security teams to drive security improvements into …

Unified identity services across data center, mobile and cloud

Tom Kemp is co-founder and CEO of Centrify Corporation, a software and cloud security provider that delivers solutions that centrally control, secure and audit access to …

Fight cybercrime with a visit to Infosecurity Europe 2013

Over the last year we have witnessed security attacks against the worlds’ largest organisations, and cyber-attacks which have increasingly been viewed as one of the …

Wolfgang Kandek presents new Qualys offerings

During RSA Conference 2013 in San Francisco, presented several news announcements. In this video, Qualys CTO Wolfgang Kandek discusses the expanded FreeScan service, the …

Pwn2Own ends with Adobe Flash, Reader and Oracle Java exploits

Day two of the Pwn2Own competition at CanSecWest was again successful for French Vupen security, as they succeeded in exploiting Adobe Flash on Internet Explorer 9 on Windows …

Most interesting products at RSA Conference 2013

The RSA Conference held each year in San Francisco is the biggest security event in the world, attracting tens of thousands visitors and (this year) over 350 exhibitors. Not …

Pwn2Own: IE, Firefox, Chrome and Java go down

The Pwn2Own competition is underway at the CanSecWest conference in Vancouver, and during the first day of competition Java, IE 10, Firefox and Chrome were successfully …

Security is changing, organizations are unprepared

F5 Networks announced the findings of its 2013 RSA Security Trends Survey, which revealed that organizations are struggling to keep pace with the changing face of security. …

Don't miss

Cybersecurity news