Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

NATO on Tuesday launched its largest-ever cyber exercises to practice warding off massive, simultaneous attacks on member states and their partners.
Please Join us for an Interactive Security Happy Hour Event on Wednesday in Washington, D.C.
Please join Trend Micro and SecurityWeek on Wednesday, Oct. 30th at Neptune's Waterfront Grill & Bar in San Francisco for an interactive security event with great food and open bar!
Please Join us for an Interactive Security Happy Hour Event on Wednesday in Washington, D.C.
The National Security Agency is gathering email and instant messenger contact lists from hundreds of millions of ordinary citizens worldwide, many of them Americans, The Washington Post reported late Monday.
Please join Trend Micro and SecurityWeek this week in Minneapolis or Atlanta for a free security seminar along with with food and open bar!
Please join Trend Micro and SecurityWeek this week in Minneapolis or Atlanta for a free security seminar along with with food and open bar!
These complimentary educational sessions are designed to be a highly interactive, and bring together industry practitioners from the National Cyber Security Alliance, Cloud Security Alliance and industry partners to help you combat the cyber underworld.
More than 10,000 participants from across the world are expected to compete in the world's biggest hacking competition during NYU-Poly Cyber Security Awareness Week.
A new report released by RSA features advice from Global 1000 on building a security team

FEATURES, INSIGHTS // Training & Certification

rss icon

Vincent Liu's picture
In developing a Secure Development Lifecycle, you always start by performing an assessment of your current situation in order to establish a baseline of where you stand. Generally, there are two different types of application assessment tools on the market - static analysis and dynamic analysis tools. But what about the human element?
Idan Aharoni's picture
There are many security companies, individual researchers and certain circles in academia that hold a wealth of information on cybercrime activities that could be the difference between a bust and a cybercrime investigation that leads to a dead end. It’s not just about collaboration with other law enforcement agencies, but also about collaboration with the security industry.
Rod Rasmussen's picture
The dangers for a university or college network can lurk everywhere from e-mail to the Internet infrastructure itself. When a student’s computer on a college network is compromised, it’s not just the student who pays the price—legally, so does the institution.
Mandeep Khera's picture
The IT industry in general loves acronyms because it’s generally appealing to geeks, but the information security space might even be slightly more obsessed with acronyms.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!