Please turn on your JavaScript for this page to function normally.
A guide to negotiating and assuring cloud services

How can an organization safely adopt cloud services to gain the benefits they provide? The easy availability of cloud services has sometimes led to line of business managers …

A closer look at Hack In The Box 2013 Amsterdam

Here’s a look at Hack In The Box 2013 Amsterdam, that took place at the Okura Hotel on April 10-11. This year’s event is going to be remembered by the widely …

TDoS: The latest wave of Denial of Service attacks

Hackers have been able to weasel their way into computer networks from nearly every direction. From malware to ransomware, and everything in between, cyber crooks are always …

You’ve been hacked, now what?

Given the increased frequency and complexity of cyber attacks on business networks of all sizes, the odds of experiencing a breach is almost guaranteed if the right security …

A call to arms for infosec professionals

An old saying says “nature abhors a vacuum,” meaning that in the absence of something nature will find a way of filling that gap. We are currently witnessing the …

We’re losing the battle against state sponsored attacks

In my daily interaction with Government bodies, Police and other public sector authorities, we are seeing a huge rise in attacks which are state sponsored and targeted at the …

SCADA security

Amol Sarwate is the Director of Vulnerability Labs at Qualys. In this video, recorded at RSA Conference 2013, Sarwate introduces SCADA security.

Computer forensic examiners are from Mars, attorneys are from Venus

The outcome of high stakes investigations and litigation can often depend on the evidence uncovered through computer forensic investigation. That fact highlights the critical …

The data backup and disaster recovery market

Mike Coney is the President and CEO of Unitrends, a provider of data backup and disaster recovery solutions. In this podcast, recorded at RSA Conference 2013, Coney talks …

Making a case for security optimism

Jeff Jones is a Director at Microsoft Trustworthy Computing. He works with enterprise CSOs and Microsoft’s internal security teams to drive security improvements into …

Security in a hyperconnected world

In this video, recorded at RSA Conference 2013, Qualys Chairman and CEO Philippe Courtot talks about the threats caused by intelligent devices as well as the changes required …

Unified identity services across data center, mobile and cloud

Tom Kemp is co-founder and CEO of Centrify Corporation, a software and cloud security provider that delivers solutions that centrally control, secure and audit access to …

Don't miss

Cybersecurity news