Service Provider

4c1c5119b03285e3f64bd83a8f9dfeec

Security and Privacy in a Connected and Cloudy World

November 29, 2012

A few months ago, I was invited to present at a summit organized by the New Zealand Privacy Commission, a government organization that is tasked with setting policies to ensure citizens of New Zealand remain secure when it comes to the use of their private information...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Utilizing Network Security Solutions: A Customer’s Perspective

August 16, 2012

Anyone can go research IT companies and make decisions based solely on what they read, but this is not how people make decisions. People interested in buying a product or service want to know if it will work, how well it has worked in the past, and if current customers are happy with the product or service...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Translating Security for the Non-Technical Folks

August 15, 2012

To provide more effective data protection that combines preventive and detective controls, a security admin can obtain the necessary technical information to create reports and dashboards that translate data into terms the business understands to make information security visible, measurable and accountable...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: AlienVault CTO Roger Thornton on Network Visibility

February 29, 2012

Roger Thornton, CTO at AlienVault, discusses the need for organizations to reduce the overall cost of network security visibility. He believes that technology is not the problem, but instead it is the time, money and staff needed for effective and meaningful visibility...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Dominique Karg on the AlienVault Open Source Model

February 28, 2012

Dominique Karg, Co-Founder and Chief Hacking Officer for AlienVault, took some time to discuss the many myths around open source architecture, the inherent benefits and problems, and why AlienVault ultimately decided to go with the open source model...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Straight Talk on Cloud Computing for the Enterprise

February 06, 2012

One of the fantastic things about events like this is that real people show up to listen, learn and share with their fellow attendees, and that's absolutely amazing. We managed to bring together some industry experts with vast practical knowledge on cloud computing...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Moxie Marlinspike on SSL Authenticity

November 01, 2011

An in-depth examination of the current problems with authenticity in SSL, some of the recent high-profile SSL infrastructure attacks in detail, and some strategies to definitively fix the disintegrating trust relationships at the core of this fundamental protocol...

Comments  (1)

6d117b57d55f63febe392e40a478011f

Rafal Los Tapped as HP's Cloud Security Strategist

September 29, 2011

Hewlett-Packard's Software division has tapped Infosec Island contributor Rafal Los for the position of Enterprise and Cloud Security Strategist. Los combines over a decade of deep technical expertise in information security and risk management with a critical business perspective...

Comments  (2)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Will Bechtel - Product Manager - Qualys

August 24, 2011

The demands on companies and government to protect networks from exploits that threaten the security of proprietary information have skyrocketed. The dependence on IT systems increased for nearly every business, and so have the financial motivations of criminals...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Alex Quilter - Product Manager - Qualys

August 22, 2011

Qualys is the only security company that delivers these solutions through a single Software-as-a-Service platform: QualysGuard'. All of Qualys' on demand solutions can be deployed within hours anywhere around the globe, providing customers an immediate view of their security and compliance posture...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Rodrigo Branco - Vulnerability Research - Qualys

August 14, 2011

Rodrigo Branco is the Vulnerability and Malware Research Director for Qualys, the leading provider of on demand IT security risk and compliance solutions. Qualys enables organizations to easily and cost-effectively ensure that their business technology systems remain highly secure...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Aaron Bryson - Security Engineer - Cisco

August 11, 2011

Aaron Bryson is a Senior Security Engineer for Cisco, with experience in computer, network, and information security in large corporate environments. Cisco offerings are used to create Internet solutions that make networks possible, providing access to information anywhere at any time...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Ivan Ristic - Director of Engineering - Qualys

August 10, 2011

Ivan Ristic is the Director of Engineering at Qualys, and is a respected security expert and book author, known especially for his contribution to the web application firewall field and the development of ModSecurity, the open source web application firewall. He is the author of Apache Security...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Wolfgang Kandek - CTO - Qualys

August 09, 2011

As the CTO for Qualys, Wolfgang is responsible for product direction and all operational aspects of the QualysGuard platform. Wolfgang has over 20 years of experience in developing and managing information systems, Unix-based server architectures and application delivery through the Internet...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Jeff Hudson - CEO - Venafi

August 09, 2011

While encryption was once used almost exclusively to protect information using SSL certificates and symmetric and asymmetric keys to scramble data, now it is also used in authentication mechanisms to confirm the identity of a user or a device, and for digital signing to protect data...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Josh Shaul - CTO - Application Security Inc

August 08, 2011

As the Chief Technology Officer with Application Security, Inc. (AppSec), Josh Shaul is responsible for the direction of the technical strategy, which includes the product portfolio - AppDetectivePro for auditors and IT advisors, and its flagship solution DbProtect for the enterprise...

Comments  (0)


« First   < Previous   | 1 - 2 |   Next >   Last »