The SearchSecurity.com team wraps up the year looking back at the most interesting interviews of 2008. (Part 2)
The SearchSecurity.com team wraps up the year looking back at the most interesting interviews of 2008. (Part 1)
Clickjacking, an emerging hacker technique similar to cross-site scripting, tricks a user into executing malicious commands on a seemingly legitimate or innocent website. John Strand reviews how the attack works, how it compares to cross-site-scripting and why the enterprise response may change your corporate culture.
Cryptography expert Paul Kocher talks about the search for a new hash algorithm, cryptography challenges ahead and the need for better security in embedded devices.
Neil Roiter, Senior Technology Editor of Information Security magazine interviews David Marcus of McAfee’s Avert Labs about how the bad guys are staying ahead and what the good guys can do to catch up. This is a special edition to the Security Newsmakers series.
Ravi Sandhu, director of the Institute for Cyber Security at the University of Texas at San Antonio, paints a bleak picture of the state of security research in academia.
In the latest edition of “Hot Type: Security Books in Audio,” author Patrick Park reveals two of the biggest VoIP security myths around.
And don’t forget to read an excerpt from Patrick Park’s book: Voice over IP Security.
Amit Yoran, the former cybersecurity czar at the Department of Homeland Security and a veteran security executive, joins Dennis Fisher to discuss the state of enterprise security, the Obama administration’s cybersecurity priorities and why information sharing between the government and private sector hasn’t worked.
Companies need to retool their business models for software-as-a-service (SaaS) now, says former Symantec CEO Gordon Eubanks. He is betting on the future of software delivery to be sold in the cloud. He recently joined the board of Perimeter eSecurity.