Eric Ogren of The Ogren Group talks about the focus on security fundamentals and some virtualization technologies that increase security including virtual desktops. Ogren is attending VMworld this week in San Francisco.
Editors discuss the missing federal cybersecurity coordinator, the recent debate over comments made by Heartland CEO Robert Carr blaming the PCI QSA for the breach and whether the U.S. Marines should ban social networks.
Recently, there has been a great deal of press about massive botnets and killer denial-of-service attacks. So how concerned should you really be about cyberwarfare? The threat is real, says contributor Sherri Davidoff, but the underlying problems are weaknesses in our own infrastructure. Outages can be prevented with a level head and a solid plan.
Jim Molini, a Microsoft security professional and longtime security expert explains his work as the key architect of a new secure software certification. Also, Forrester Research analyst Rob Whiteley talks about weighing risks versus attempting to secure all data.
Security researcher David Dewey of IBM ISS explains his team’s discovery of interoperability flaws affecting Microsoft and third-party vendors. Dewey estimates that as many as 10,000 components on the Internet may be affected.
Michael Mimoso, editor of Information Security magazine and Robert Westervelt, news editor of SearchSecurity.com discuss what to expect at this year’s Black Hat conference. Also, listen to an interview with Mikko H. Hyppönen of F-Secure. Hyppönen plans to give an update on Conficker during a presentation at Black Hat. Visit our Black Hat 2009 news coverage page at: searchsecurity.com/blackhat2009
Purewire principal researcher Paul Royal explains the ins and outs of the Adobe Flash vulnerability. The flaw is being exploited via PDF files and drive-by attacks. Adobe said it plans to fix the flaw by July 30.
How secure is the software produced today? Is it possible to keep attackers out of your network if they’re determined to get in? What strategies for employee security awareness training are most effective at stopping malware? Greg Hoglund explains how enterprises can face these challenging questions in order to strengthen their security programs and keep sensitive data in the right hands.
Listen to the top security experts and learn about the latest cybersecurity research. Whether it’s the spread of malware, the explosion of spam or hackers exploiting flaws to steal sensitive data, this podcast series aims to find the right ways to defend against ongoing attacks to your systems.