Read more about RSA Conference 2014
Bookmark and Share
  • Moving to the SHA-2 hashing algorithm

    14.03.2014

    In this podcast recorded at RSA Conference 2014, Jay Schiavo, Director of Products and Markets at Entrust and a member of the CA Security Council, discusses why web server administrators will have to make plans to move from SSL and code signing certificates signed with the SHA-1 hashing algorithm to certificates signed with SHA-2.

  • Building management security

    14.03.2014

    In this podcast recorded at RSA Conference 2014, Terry McCorkle, Product Manager, Vulnerability Management, Qualys, discusses flaws in building management security that most people are not aware of.

  • Top 4 security controls: Do your PCs make the grade?

    13.03.2014

    In this podcast recorded at RSA Conference 2014, Wolfgang Kandek, CTO at Qualys, talks about a new free service that help organizations implement the Top 4 Critical Security Controls to fend off attacks.

  • The role of identity in responding to the threat environment

    13.03.2014

    Organizations are struggling to respond to an evolving threat environment - APTs, insider attacks, accidental breaches.

  • How to protect against unauthorized spying

    12.03.2014

    In this podcast recorded at RSA Conference 2014, Wayne Thayer, the General Manager of Security Products at GoDaddy and a member of the CA Security Council, discusses how Edward Snowden exposed intelligence operations that have performed unauthorized spying.




Spotlight

The evolution of backup and disaster recovery

Posted on 25 July 2014.  |  Amanda Strassle, IT Senior Director of Data Center Service Delivery at Seagate Technology, talks about enterprise backup issues, illustrates how the cloud shaping an IT department's approach to backup and disaster recovery, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Jul 28th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //