conferences
RSA helps thwart smash-and-grab credential theft
At RSA Conference Europe 2012 in London, RSA introduced a new technology designed to protect passwords and other credentials and secrets stored in databases from cyber …
Free mobile app profiler for risk assessment
At RSA Conference Europe 2012, Zscaler announced the results of an analysis from ThreatLabZ which reveals that up to 10 percent of mobile apps expose user passwords and login …
Mounting risks from mobile devices in the enterprise
At RSA Conference Europe 2012, RSA released a new research report from the Security for Business Innovation Council (SBIC) that addresses the continued surge of consumer …
Penetration testers need to advance their skills
Ahead of SANS London 2012, Europe’s largest IT security training event, a top security expert and trainer is warning that a big challenge and knowledge gap for …
Inside SANS London 2012
Matt Anderson is the Director, EMEA at SANS Institute. In this interview he talks about SANS London 2012, Europe’s biggest and most important information security …
Information-related risks, threats and compliance
Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is a member of the Commission on Cyber Security for the 44th President and several executive …
Win a free ticket to RSA Conference Europe 2012
RSA Conference Europe 2012 is scheduled to be held in London on October 9-11, and Help Net Security is offering a free ticket to the event for one lucky reader. RSA Conference …
Limited seats remain for SANS Forensics Summit in Prague
Organisers have made a “last call” for attendees to register for SANS first dedicated Digital Forensics event in Prague this October. The weeklong event begins on …
Full keynote lineup announced for RSA Conference Europe 2012
RSA Conference announced its complete line-up of keynote speakers for the 13th annual RSA Conference Europe, taking place from 9th -11th October 2012, at the Hilton London …
The QR code: A new frontier in mobile attackability
A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …
Chimera: A declarative language for streaming network traffic analysis
Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …
What keeps information security leaders awake at night
In this interview, Herbert ‘Hugh’ Thompson, Program Committee Chair for RSA Conferences and Chief Security Strategist at People Security, talks about challenges …