Video interview with George P. Japak, Vice President of ICSA Labs
by Mirko Zorz - Wednesday, 15 December 2004.
In this video Mr. Japak talks about the importance of product certification, the full disclosure of vulnerabilities, how ICSA Labs approaches product testing, how they determine the severity of a vulnerability, and much more.
Discussions about security intelligence still focus primarily around conventional reactive SIEM. Security pros need to move from this reactive model to proactively using this security intelligence to protect their businesses.
Today almost every company is dealing with big data in one way or another – including customer data, tracking data, and behavioral marketing information – connecting every aspect of our lives. While this is a cutting edge use of technology, data monitoring can become dangerous when placed in the wrong hands.
Robert Hansen, Vice President of WhiteHat Security Labs, discusses the evolution of web application security, offers advice on how to improve web application security practices, recommends tools, and more.
While there is an increasing recognition in many organizations that application security is an important piece of the overall puzzle, putting together a comprehensive strategy that will effectively reduce an organization’s risk profile is not easy.