In this video recorded at Infosecurity 2012, Wolfgang Kandek, CTO at Qualys, talks about their recent research dealing with Java.
Many modern exploits use Java as a stepping stone to gain access to a system. While this has been common on computers running Windows for some time, recently Mac OS X users have become targets as well.
Posted on 28 August 2014. | As an active adventure gamer, Dwayne Melancon, CTO at Tripwire, noticed that some of the things he does to achieve success in video games can be applied to information security.
Posted on 27 August 2014. | Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.
Posted on 26 August 2014. | Stuart McClure, CEO at Cylance, talks about how the information security industry has evolved when it comes to detecting bad guys, but it's being mostly reactive and not proactive.