Security Wire Weekly


April 29, 2009  7:25 PM

Incident response and forensics

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Trend Micro buys Third Brigade. Also Agile Risk Management’s Matthew Shannon talks about incident response best practices, including ways to accelerate the process, how compliance enables better incident response, and what makes a successful incident response.

Program links:

Trend Micro to acquire Third Brigade for virtualization: Trend Micro said Third Brigade’s technology bolsters its datacenter security strategy by helping its customers protect virtual servers and cloud computing initiatives.

Video: Security incident response 101:
Even the best procedures fail to overcome the stresses in the initial throes of an incident. Security consultant Lenny Zeltser explains how to run a well coordinated response.

April 28, 2009  8:19 PM

RSA cryptographer Ari Juels on RFID, encryption

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Security NewsmakersSearchSecurity.com’s Neil Roiter interviews well known cryptographer Ari Juels about RFID security, cloud storage innovations and his new novel.


April 23, 2009  12:56 PM

Kaspersky sees Internet IDs ahead

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Kaspersky Lab CEO Eugene Kaspersky predicts that one day people will need an ID card to access the Internet. In this wide ranging interview at the 2009 RSA Conference, Kaspersky talks about the Conficker worm, attacker sophistication and tracking cybercriminals.


April 23, 2009  11:43 AM

AJAX platform injects security

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Kyle Adams and Al Huizenga of new startup Mykonos talk about their new platform that injects security into the software development lifecycle for AJAX applications. Also, security expert David Mortman on cloud computing.


April 22, 2009  12:12 PM

PCI Council readying new virtualization requirements

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

In an interview at the 2009 RSA Conference, Troy Leach, technical director of the PCI Security Standards Council said the organization is exploring ways to address the security challenges with virtualization and cloud computing. He said new requirements are likely.


April 17, 2009  4:15 PM

RSA preview: Google makes its case for defending the cloud

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Security NewsmakersEric Feignebaum, director of security for Google Apps, asserts cloud computing can be as secure as or even more secure than traditional corporate security. Feigenbaum will participate in a panel at the 2009 RSA Conference, “Cloud computing – secure enough for primetime today?”


April 15, 2009  4:15 PM

RSA preview: Budget issues to dominate

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Andreas Antonopoulos of Nemertes Research, Charles Kolodgy of IDC and Chenxi Wang of Forrester Research talk about the major trends to dominate the RSA Conference. Shrinking budgets, application security, virtualization and encryption could dominate the event, the industry analysts said.


April 13, 2009  1:42 PM

Enrique Salem takes charge at Symantec

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Security NewsmakersEnrique Salem, who took over as Symantec CEO for the retiring John Thompson on April 4, talks about the Symantec he worked for in the 1990s, the Symantec he inherits today, and the Symantec he envisions for the future.


April 8, 2009  9:23 AM

Cloud computing security

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Jim Reavis of the Cloud Security Alliance talks about the new organization’s goals and the challenges ahead for cloud computing. Also, David Goldstone of Goodwin Procter on the failure of data breach class action lawsuits.


April 7, 2009  1:05 PM

New model supports secure software coding

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Security NewsmakersBrian Chess of Fortify Software and Sammy Migues of Cigital talk about the “Building Security In Maturity Model” (BSIMM), a blueprint for secure software development, a collection of best practices distilled from nine of the best programs in the world.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: