Podcasts
  • Mobile data leakage

    In this podcast recorded at RSA Conference 2014, Mike Raggo, Security Evangelist at MobileIron, discusses mobile data leakage, and provides tips on how to secure email, public and in-house apps, illustrates data exposure, and much more.

  • SSL innovations

    In this podcast recorded at RSA Conference 2014, Wayne Thayer, the General Manager of Security Products at GoDaddy and a member of the CA Security Council, compares and explains certificate transparency, certificate authority authorization and certificate pinning.

  • Moving to the SHA-2 hashing algorithm

    In this podcast recorded at RSA Conference 2014, Jay Schiavo, Director of Products and Markets at Entrust and a member of the CA Security Council, discusses why web server administrators will have to make plans to move from SSL and code signing certificates signed with the SHA-1 hashing algorithm to certificates signed with SHA-2. This is the result of the new Microsoft Root Certificate Policy where Microsoft deprecates SHA-1.

  • Building management security

    In this podcast recorded at RSA Conference 2014, Terry McCorkle, Product Manager, Vulnerability Management, Qualys, discusses flaws in building management security that most people are not aware of.

    This podcasts outlines some of the vulnerabilities you should be watching for in your environment.

  • Top 4 security controls: Do your PCs make the grade?

    In this podcast recorded at RSA Conference 2014, Wolfgang Kandek, CTO at Qualys, talks about a new free service that help organizations implement the Top 4 Critical Security Controls to fend off attacks.

    The new service helps organizations quickly determine if the PCs in their environments have properly implemented the Top 4 Critical Security Controls, which the Council on CyberSecurity estimates can help companies prevent 85% of cyber-attacks.



Spotlight

Security pros and government failing to collaborate

Posted on 17 April 2014.  |  More effective collaboration between government and the information security industry is crucial to protecting organizations from future cyber threats. More work needs to be done to strengthen government’s position as a source of information on potential threats.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //