Security Wire Weekly:

July, 2008

1

July 31, 2008  3:08 PM

The state of software security

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Gary McGraw, CTO of Cigital, is the first guest on SearchSecurity.com's newest podcast series, The Nameless Security Podcast with Dennis Fisher. McGraw discusses the state of software security, the increasing influence of outside disciplines on the security industry and how his own background in...

July 30, 2008  2:39 PM

SWW: Infiltrating phishers

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Security researchers Billy Rios and Nitesh Dhanjani explain how they infiltrated the phishing underground in a preview of their upcoming Black Hat...


July 28, 2008  4:51 PM

Lessons Learned Four Years of Data Breaches

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Security NewsmakersIs your data safe? Do you know who you can trust? Do you know where the next attack is likely to come from? Think again....


July 23, 2008  2:13 PM

SWW: Virtualization Security Apocalypse

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Christofer Hoff, chief security architect at Unisys, previews his upcoming Black Hat briefing "The four horsemen of the virtualization security...


July 16, 2008  2:23 PM

Threat Monitor: Ransomware — How to deal with advanced encryption algorithms

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

It's late in the day, and your CEO reports a strange message on his computer screen: his files have been encrypted, and a payment is required to return...


July 16, 2008  1:55 PM

Security Wire Weekly – Dan Kaminsky on the DNS Server flaw

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Noted network security researcher Dan Kaminsky, director of penetration testing at IOActive, explains his discovery of a DNS Server flaw that led to a...


July 9, 2008  1:44 PM

Security Wire Weekly: iPhone Mania and Enterprise Security

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Tom Cross, mobile security expert with IBM's X-Force security research team discusses smartphone security on the heels of Apple’s release of iPhone 3G....


July 3, 2008  8:50 AM

Threat Monitor: Hidden endpoints — Mitigating the threat of non-traditional network devices

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Organizations have many safeguards in place for network-enabled devices like PCs and servers, but few realize the threat posed by non-traditional...


July 2, 2008  2:03 PM

Security Wire Weekly: SQL Injection Protection

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Scott Matsumoto, a principal consultant and secure coding expert with Cigital Inc. talks about SQL injection attacks. Matsumoto explains the tools...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: