Video interview with George P. Japak, Vice President of ICSA Labs
by Mirko Zorz - Wednesday, 15 December 2004.
In this video Mr. Japak talks about the importance of product certification, the full disclosure of vulnerabilities, how ICSA Labs approaches product testing, how they determine the severity of a vulnerability, and much more.
Posted on 21 October 2104. | Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.
Posted on 15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.
Posted on 14 October 2014. | Enabling employees and contractors to bring their own devices to work has become a way of life for many organizations. Many understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices.