Please turn on your JavaScript for this page to function normally.
New data breach legislation

In the past two months, there have been two bills introduced in Washington, D.C. that are attempting to set nationwide standards for the security and privacy of …

SSL Labs: Researching the technology that protects the Internet

In this video recorded at Black Hat USA 2010, Ivan Ristic talks about SSL Labs – a non-commercial research effort and collection of documents and tools related to SSL. …

Five imperatives for extreme data protection in virtualized environments

Transforming an organization through server virtualization requires a strategic and coordinated approach. Data protection – which includes not only backup, but also …

A closer look at MacCleanse

MacCleanse (v. 2.0.6) is a small application that safely erases caches, logs, cookies, histories, and more. It provides detailed information on each item it cleanses, and can …

Security B-Sides: The anti-conference

Security B-Sides is a DIY, open security conference that is free to all attendees. These events are corporate sponsored, centrally managed (though locally organized) and do …

BlindElephant: Open source web application fingerprinting engine

In this video recorded at Black Hat USA 2010, Patrick Thomas, a vulnerability researcher at Qualys, discusses the open source web application fingerprinting engine …

Q&A: SOURCE Barcelona

Stacy Thayer is the Founder and Executive Director of SOURCE Conferences. Prior to founding SOURCE Conferences, Stacy was employed for a Fortune 500 company, where she worked …

How to clean up a firewall rulebase

Over time, firewall rule bases tend to become large and complicated. They often include rules that are either partially or completely unused, expired or shadowed. The problem …

A closer look at Panda Cloud Antivirus Free Edition

Panda Cloud Antivirus (v.1.1.2) consists of a lightweight antivirus agent that is connected in real-time to PandaLabs’ online Collective Intelligence servers for a …

Q&A: Strong authentication

Mike Moir is a Product Manager for the Entrust IdentityGuard solution. In this interview he talks about strong authentication. Based on your experience, how critical is …

Secure by design

In this video recorded at the IBM Innovate 2010 conference, David Grant, the Director of Security Solutions at IBM Rational, talks about how software is the invisible thread …

Q&A: Sandbox for Adobe Reader

Didier Stevens is an IT security consultant well-known for his research into malicious PDF files. Since Adobe announced a sandbox for Adobe Reader, it was a perfect …

Don't miss

Cybersecurity news