Expert analysis
Stephen Northcutt on Security Certification and the SANS Top 20
Stephen Northcutt, the CEO of the SANS Institute, provides us with an overview of SANS activities, the Internet Storm Center, the SANS Top 20 and the evolution of the IT …
Today’s Biggest IT Security Menace and 6 Ways to Fight It
What is today’s biggest IT security threat? IT itself, according to recent reports from IDC and Carnegie Mellon/DoD. To begin with, IDC research finds that enterprise …
The Future of Spam
In the 1930s, the US psychologist Abraham Maslow formulated a theory that according to which, everybody has a series of basic needs that must be covered in a certain order, so …
Web 2.0 Threats and Risks for Financial Services
Web 2.0 technologies are gaining momentum worldwide, penetrating in all industries as enterprise 2.0 applications. Financial services are no exception to this trend. One of …
New Security Features in Internet Explorer 7
Markellos Diorinos from the IE team at Microsoft introduces the new security features in IE 7 and speaks about extended validation SSL certificates. He also covers the …
Microsoft Information Protection
Keith Brintzenhofe, the Manager of the Information Protection Platform Team at Microsoft, discusses their approach to information protection. He talks about new security …
Hacking the Cisco NAC – NACATTACK
At Black Hat Europe we met Dror-John Roecher and Michael Thumann who were able to hack the Cisco NAC solution by exploiting a fundamental design flaw (PDF). In this video they …
HNS Podcast: The Present State of E-mail Security
Amir Lev co-founded Commtouch in February 1991 and serves as Chief Technology Officer and President. In this podcast he discusses the current state of e-mail security and …
The Rise of SSL VPNs
The growth of Secure Sockets Layer virtual private networks (SSL VPNs) has accelerated in the last 12 months due to greater awareness among users of the commercial advantages, …
JavaScript Malware for a Gray Goo Tomorrow!
Billy Hoffman presented this at Shmoocon in March 2007. He discussed JavaScript malware in general, Ajax, port scanning and presented Jikto – a JavaScript Web …
Hackers convened in Amsterdam for Black Hat Europe
Last week an impressive crowd of security professionals, high profile speakers, hackers as well as incognito individuals going only by their first name, gathered at the …
Five Golden Steps to Stopping the Sabotage of Sensitive Corporate Data
So it’s official then. Men are more truthful than women, and Scots are the most truthful social group in the UK. A recent research by YouGov, and commissioned by …