Security Wire Weekly


October 31, 2009  12:29 PM

Squad: Tokenization, Phishing and the Feds

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

SearchSecurity editors discuss the importance of Microsoft’s record breaking number of October vulnerabilities, the federal government’s plan to hire 1,000 cybersecurity pros, the FBI’s crackdown on a massive phishing ring and the latest payment industry tokenization plans.

October 28, 2009  7:10 PM

Silon Trojan strikes Internet Explorer users

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Amit Klein, CTO of Trusteer Inc. on a new two-headed Trojan striking Inernet Explorer users to steal login credentials.


October 22, 2009  2:08 PM

Heartland CIO on PCI, E3 project

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Heartland Payment Systems CIO Steve Elefant talks about the processor’s new E3 security processes, end-to-end encryption, deployment and adoption issues.


October 14, 2009  8:55 PM

Nuke and pave to eradicate botnets

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Security researcher Gunter Ollmann of Damballa discusses the scourge of dangerous enterprise botnets and why the only method to eradicate them is by a method he calls “nuke and pave.”


October 7, 2009  8:51 PM

Exploring encryption, DLP

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Richard Jacobs, chief technology officer of Sophos on encryption for compliance, DLP and the case for involving end users in security decisions.


October 1, 2009  7:08 PM

Threat Monitor: An enterprise strategy for Web application security threats

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

People Security founder Hugh Thompson reviews the tools and tactics, from routine assessments to Web application firewalls, that are essential to an application security strategy,


September 24, 2009  1:23 PM

Digital forensics, breach incident response

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Jim Jaeger, a retired Air Force brigadier general who heads the digital forensics operation at defense industry giant General Dynamics, explains best practices around data breach response and digital forensics.


September 22, 2009  4:21 PM

Privacy gone awry

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

SearchSecurity editors discuss Internet privacy issues, the Apache disclosure, VMworld and Apple security.


September 17, 2009  12:27 PM

SANS Top Cybersecurity Risks

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Experts discuss the findings of the SANS Institute 2009 Top Cyber Risks Report. The SANS report, The Top Cyber Security Risks found that IT security professionals are failing to adequately address client-side application flaws and website vulnerabilities.  Meanwhile, cybercriminals are using spear phishing attacks and automated SQL injection attacks to infect employee machines and ultimately gain access to company networks.


September 10, 2009  6:32 PM

DNSSEC – Challenges and pitfalls

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Security experts and officials involved in DNSSEC implementations share their successes and the challenges they face.

Program notes: DNSSEC deployments gain momentum since Kaminsky DNS bug

Kaminsky interview: DNSSEC addresses cross-organizational trust and security


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: