conferences
The m00p gang investigation: a failure or a success?
Security companies and law enforcement agencies often collaborate on cyber crime investigations, and most of these investigations do end up with the arrest, prosecution and …
Microsoft puts vulnerability exploitation into context
Recently Microsoft released the 11th volume of the Microsoft Security Intelligence Report, the most comprehensive version of this report to date. In this podcast, Tim Rains, …
SANS virtualization security course returns to London
The SANS Institute has added Security 577 Virtualization Security Fundamentals to the line-up for SANS 2011 London following popular demand. On its European début last year, …
Photos: The look and feel of RSA Conference Europe 2011
Help Net Security is attending RSA Conference Europe 2011 in London this week. Here’s an overview of the event in photos. Art Coviello, Executive Vice President, EMC …
SANS offers discount for London 2011 training event
Even with the tough economic conditions last year, over 400 students attended SANS London 2010 and that figure is likely to increase for 2011 as SANS unveils its largest ever …
Most trusted source for security training comes to London
In the last 12 months, we have seen a marked rise in hacktivism, financially motivated crime, and potentially state-sponsored cyber attacks. The range of targets has also …
Verizon Business data breach investigations report 2011: 8 days a week
What can be learned from the investigation into successful data breaches? What are the latest trends and techniques used by attackers? Get a front row seat at the breach cases …
Photos: The look and feel of Virus Bulletin 2011
Help Net Security is attending the Virus Bulletin 2011 conference in Barcelona this week. Here’s an overview of the event in photos. DC Bob Burls of UK’s Police …
RSA Conference Europe full keynote line-up
RSA Conference announced its complete line-up of keynote speakers for the 12th annual RSA Conference Europe, taking place from 11th-13th October 2011 in London. The Conference …
Towards secure tokenization algorithms and architectures
Tokenization – the use of surrogate values for sensitive data – is all the rage. Although it is often sold as an alternative to encryption, it is at the core a …
Advanced persistent threats, cloud security and mobile security to dominate RSA Conference Europe 2011
This is an interview with Linda Lynch, RSA Conference Europe Manager and Herbert “Hugh” Thompson, Ph.D, Chief Security Strategist, People Security and RSA …
IRISSCERT cyber crime conference announces speakers
IRISS will hold its second annual conference on Wednesday the 23rd of November 2011 in Dublin. This is an all day conference which focuses on providing attendees with an …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)