Next generation security as a service
In this video recorded at Black Hat 2011 in Las Vegas, Sumedh Thakar, Vice President of Engineering at Qualys, talks about QualysGuard Web Application Scanning (WAS) 2.0, the …
Professionalism on the witness stand
This is a basic guide to preparation for the courthouse and the witness stand: Presentation on systematic and detailed preparation for testimony Communication with lawyers …
Hacking a mature security program
Most organizations are used to standard penetration tests. However, companies that have been increasing their overall security posture proactively through years of program …
Mikko Hypponen: Fighting viruses, defending the net
It’s been 25 years since the first PC virus (Brain A) hit the net, and what was once an annoyance has become a sophisticated tool for crime and espionage. Computer …
Recent HIPAA/HITECH changes
As part of the American Recovery and Reinvestment Act of 2009, Congress enacted the Health Information Technology for Economic and Clinical Health (HITECH) Act to broaden and …
Securing the virtual environment
In this video, Dimitri McKay, Security Architect at LogLogic, talks about vulnerabilities and the security challenges surrounding virtual environments: hyperjacking, VM …
Video: Inside the new Facebook data center
Facebook recently opened its new data center in Oregon and journalists were able to visit the Prineville facility. The videos below, recorded by Data Center Knowledge, take …
Why stealing at a security conference is a bad idea
ISC West is one of the biggest international security conferences, and practically every inch of the expo floor has a camera or two trained on it. You would expect that such a …
Application security vulnerabilities
Rafal Los, Application Security Evangelist at HP Software, talks about application security vulnerabilities at the logic level. The inner-workings of an application can only …
Social media threats and targeted attacks
In the video below, Alexandru Catalin Cosoi, the Head of Online Threats Lab at BitDefender, talks about the new breed of social media threats and sophisticated targeted …
How secure is your browser?
Qualys CTO Wolfgang Kandek talks about research which clearly shows that browser security is alarmingly bad. Browsers and plug-ins are frequently outdated and easily attacked. …
Cenzic at a glance
John Weinschenk, President & CEO of Cenzic, talks about the company and their product line. Cenzic is a provider of software, managed service, and cloud security products …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility