Please turn on your JavaScript for this page to function normally.
Blocking zero-day application exploits: A new approach for APT prevention

Cybercriminals continue to develop new methods to bypass security controls in order to install malware on corporate endpoints. The recently discovered advanced persistent …

Defending the Internet at scale

A decade ago, engineers tackled the C10K scalability problems that prevented servers from handling more than 10,000 concurrent connections. This problem was solved by fixing …

Armor for your Android apps

This defensive security talk from Shmoocon 2013 is primarily targeted towards Android developers. The speaker shares “war stories” of Android vulnerabilities and …

SCADA security

Amol Sarwate is the Director of Vulnerability Labs at Qualys. In this video, recorded at RSA Conference 2013, Sarwate introduces SCADA security.

Microsoft releases privacy and security guide for policy makers

Microsoft released the third volume of its popular policymaker booklet, Building Global Trust Online, which includes considerations and guidance for a number of new …

Ideas for deterring cyber espionage attacks

There has been much talk about whether the cyber espionage attacks should be considered acts of war, and about what can be done to prevent them. Retaliation being hard to …

The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win

As I've always worked at small companies, I've been fascinated by the politics and problems experienced by those working for larger organizations. Surviving and thriving in …

Top April Fools’ Day hoaxes throughout history

April Fools’ Day is a time for practical jokes, hoaxes and laughs. However, it’s important to understand that April Fools’ Day is also an ample opportunity …

Computer forensic examiners are from Mars, attorneys are from Venus

The outcome of high stakes investigations and litigation can often depend on the evidence uncovered through computer forensic investigation. That fact highlights the critical …

Attacking SCADA wireless systems

Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …

Strategies of a world-class computer security incident response team

Today’s Computer Security Incident Response Team (CSIRT) should have everything they need to mount a competent defense of the ever-changing IT enterprise: a vast array …

Becoming a malware analyst

There are few jobs in this industry that seem as appealing and interesting to me as that of a malware analyst. In my mind, these professionals were waking up each day to …

Don't miss

Cybersecurity news