Gareth Machlachlan, founder and chief operating officer of AdaptiveMobile explains why mobile carriers should take a more active role in securing mobile devices.
The SearchSecurity team talks about the latest certificate authority breach putting digital certificates at risk and Sophos’ response to weaknesses found in its antivirus software.
James Lyne, director of technology strategy at Sophos talks about software improvements the vendor is making in the wake of a Black Hat talk that outed coding and design weaknesses. Lyne also discusses what’s next for mobile device security and explains why hacktivism threats should not be the top priority of enterprise CISOs.
Catalin Cosoi, head of the online threats lab at BitDefender on spam and malware analysis, the Waledac spambot takedown and the hacktivism trend.
Jon McCoy of DigitalBodyGuard talks about his new tool GrayWolf, a compiler that helps .NET developers attack their applications. GrayWolf was released at the Black Hat 2011 security conference. McCoy said the tool can help programmers understand weaknesses and build stronger applications.
SearchSecurity.com Editorial Director Michael Mimoso talks to NetWitness Corp., CSO Eddie Schwartz live from Black Hat 2011. Schwartz talks about NetWitness’ involvement in detecting the SecurID attack against RSA, as well as the hacktivism revival.
SearchSecurity.com editors Michael Mimoso and Robert Westervelt preview the upcoming Black Hat security conference. Presentations are slated on network security issues, Google hacking, Windows vulnerabilities and mobile security threats.
Damballa botnet researcher Manos Antonakakis talks about the latest botnets and how new technology being developed can aid in their detection, tracking and elimination.
Trend reports can be easily misinterpreted, says Wade Baker director of risk intelligence at Verizon Business. In this interview, Baker lays out some common misinterpretations of the 2011 Verizon DBIR and explains some figures that may be more important to enterprise CISOs.
SearchSecurity.com editors discuss whether Lulzsec’s activities have prompted any changes from the IT security community and whether the group has had a negative impact on cybersecurity. Other issues include the new PCI virtualization guidance; Mac rogueware and Apple’s response and the challenges posed by the move to IPv6.