Security Wire Weekly

October 20, 2010  5:05 PM

The advanced persistent threat and the state of traditional perimeter protection

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

This year’s Security 7 Award winners discuss targeted attacks and how strategies for securing the network perimeter have changed.

The podcast participants include:

Phil Agcaoili, chief information security officer, Cox Communications

Brian Engle, director of information security, Temple-Inland

Christopher Ipsen, chief infortmation security officer, State of Nevada

Nick Mankovich, senior director of product security and privacy, Philips Healthcare

Julie Myers, chief information security officer, University of Rochester 


October 15, 2010  3:25 PM

The security-compliance tug-of-war

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Bryan E. Simon, senior systems and security specialist at Prince George, BC-based Integris Credit Union, talks about the daily struggles security pros face, including the need to balance security demands with compliance requirements.

September 22, 2010  6:15 PM

Twitter woes and eEye’s zero-day service

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Marc Maiffret of eEye Digital Security talks about his hacking career and the revival of his company’s zero-day tracking service. Also, Jeremiah Grossman of WhiteHat Security on the latest Twitter vulnerability.

September 20, 2010  8:41 PM

Big changes ahead for security market?

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati editors talk with Pete Lindstrom, a longtime security industry observer and research director at Spire Security about the latest security vendor acquisitions and what they mean for the market. Also, should security pros be silenced by their employers?

September 2, 2010  3:56 PM

Joe Stewart: Botnets are hard to bring down

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Botnet and malware expert Joe Stewart explains why it is difficult for security teams to take down botnets. Stewart, director of malware research at SecureWorks talks about the data that can be gleaned from command and control servers and what ISPs are doing to defend against zombie computers.

August 26, 2010  3:03 PM

Secure Software development starts at the top

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Ryan Berg a senior architect of security research for IBM talks about ways enterprises can improve their software development processes and why some firms are falling behind.

August 6, 2010  2:44 PM

Patrolling the Channel: A closer look at the Check Point partner program

JohnMWillis John Willis Profile: JohnMWillis

In this edition of Patrolling the Channel, Check Point v.p. Amnon Bar-Lev sat down with and talked about the top challenges facing his partners today.

August 2, 2010  8:06 PM

Black Hat 2010: Jim Reavis on first Cloud Security Alliance user certification

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

In this interview with Editorial Director Michael Mimoso, Jim Reavis, cofounder of the Cloud Security Alliance, discusses the group’s first user certification, the Certificate of Cloud Security Knowledge (CCSK). The CCSK will demonstrate an individual’s understanding of the key concepts of the Cloud Security Alliance’s guidance and best practices, as well as those of the European Network and Information Security Agency (ENISA). Reavis also discusses the state of cloud security awareness among enterprises moving services and processes into the cloud, and how IT organizations should address security and compliance in the context of cloud computing.)

July 29, 2010  2:56 PM

Black Hat 2010: Tom Kellermann on advanced persistent threat (APT), and cybersecurity and the U.S. government

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Core Security’s Tom Kellermann goes in depth on his thoughts about advanced persistent threat, how to deal with foreign adversaries and where and why the U.S. government is coming up short in fending off targeted and persistent attacks from cybercriminals and foreign governments

July 28, 2010  9:28 PM

Black Hat 2010: Greg Hoglund on malware attribution and fingerprinting

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Greg Hoglund, founder of HB Gary Inc., presented his work on malware attribution and fingerprinting today at Black Hat in Las Vegas. In this interview, Hoglund talks about his research into looking at how to best trace malware to its author by looking at toolmarks left by the hacker within code. By studying similarities in coding techniques, different attacks can be linked and better traced to their source. Hoglund talks about how enterprises can take a similary approach and how a new open source tool released today can help.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: