Expert analysis
Cloud computing choices
The cloud provides an alternative way of procuring IT services that offers many benefits, including increased flexibility as well as reduced cost. It extends the spectrum of …
The potential of virtualization security
In this podcast recorded at RSA Conference 2012, Anup Ghosh, CEO of Invincea, tells us how security hasn’t advanced much in the past decade from a technology point of …
Security considerations for IPv6 launch day
In case you haven’t been glued to the Internet Society (ISOC) website, there soon will be some rather large changes to the Internet as the much anticipated World IPv6 …
Top 10 patching hurdles and how to overcome them
Patching is the most effective, efficient and simple method to mitigate malware, worms and viruses. It may not protect against advance attacks that make use of 0-day …
SSL governance and implementation across the Internet
Philippe Courtot, founder of the Trustworthy Internet Movement (TIM), and chairman and CEO of Qualys, talks about how the TIM has chosen SSL governance and implementation …
Top three security concerns for CSOs and CIOs
The breakneck speed of technology evolution, the ever changing threat landscape, and the increasing flexibility, ingenuity and persistence of cyber attackers have made …
The creation and evolution of the superuser
When I think about managing identities and privileges within an organisation, one of my favorite analogies for the whole privileged identity lifecycle is biblical. Everything …
Securing mobile apps in the enterprise
The mobile app has become the endpoint. With the advent of consumerization and BYOD, the number of managed devices began shrinking and that of unmanaged devices continues to …
A basic shift in network defense
“In our industry, most of the companies we were working with have spent the the better part of the past ten years securing the perimeter of the network with intrusion …
Global dashboard for monitoring the quality of SSL support
Last week we announced SSL Pulse, a continuously updated dashboard that is designed to show the state of the SSL ecosystem at a glance. While it is possible today to deploy …
Entitlement administration and governance
In the identity and access management (IAM) market, we’ve got the terminology all wrong. With bad labels comes misdirected thinking, which ultimately contributes to …
Securing embedded devices
Like with computers, mobile phones, cars and many other things that man created, thermostats, automatic doors, insulin pumps, control panels for a great many instruments and …