Expert analysis
Gerhard Eschelbeck on the Common Vulnerability Scoring System (CVSS)
Gerhard Eschelbeck is the CTO & Vice President of engineering of Qualys. In this audio Mr. Eschelbeck discusses the Common Vulnerability Scoring System (CVSS), the …
Does Firefox Really Provide More Security Than Internet Explorer?
Introduction Internet Explorer is a graphical web browser made by Microsoft and comes integrated with Windows. Even though it’s by far the most widely used browser, …
Domain Footprinting for Web Applications and Web Services
A wide array of services, from banking and finance transactions to auctions and ticket reservations, are being offered to customers online. This means that an Internet …
Web Application Defense At The Gates – Leveraging IHttpModule
Web applications are vulnerable to many attacks, mainly due to poor input validation at the source code level. Firewalls can block access to ports but once a web application …
Securing Optical Networks With Quantum Cryptography
In a world where the reliance on electronic data transmission and processing is becoming every day more prevalent, it is of critical importance for organizations to guarantee …
Qualys CTO on SANS Top 20 Quaterly Update
More than 600 new Internet security vulnerabilities were discovered during the first quarter of 2005, according to the SANS Institute and a team of experts from industry and …
Infosecurity Europe 2005 – First Issue of (IN)SECURE Magazine Available for Download
During the second day of Infosecurity Europe 2005 Conference, HNS announced the first issue of (IN)SECURE Magazine, a freely available, freely distributable digital security …
Infosecurity Europe 2005 Showcase Video
Here’s a showcase of the Infosecurity Europe 2005 conference in London. The video is 2:58 minutes in length, available for download in Windows Media 9 256K (5.5 MB) and …
Infosecurity Europe 2005 – ZyXEL Launches the First Stand-alone Single User Firewall
The ZyWALL P1 is the first portable, single-user personal firewall device designed to enable remote workers to connect to any corporate VPN securely, without the need for VPN …
Wireless Security Starts at the Endpoint
Offering convenience and ease of use that have revolutionized the way people use computers and networks, wireless networks have also complicated endpoint management and …
Who Can You Trust?
Companies have traditionally adopted a fortress mentality with network perimeter security to protect corporate applications and assets. But things are changing, driven by …
Bugger The Debugger – Pre Interaction Debugger Code Execution
The use of debuggers to analyse malicious or otherwise unknown binaries has become a requirement for reverse engineering executables to help determine their purpose. While …