Automating change to tackle advanced threats

In this interview, Chris Fedde, president of Hexis Cyber Solutions, addresses fears on how automated solutions can interfere with network operations.

Catching up with Yahoo CISO Alex Stamos

In this video, Ashley Carman, editorial assistant at SC Magazine, hears about Yahoo's future plans and Stamos' thoughts on the company's responsibility to keep users safe.

IBM previews 2014 CISO survey

In this video, Danielle Walker, senior reporter at SC Magazine, gets a sneak peek at an upcoming CISO survey conducted by IBM. Kris Lovejoy, general manager of security services at IBM, discusses the findings.

Preparing for the Internet of Things

In this video, John McCormack, CEO at Websense, sits with SC Magazine Senior Reporter Danielle Walker, to discuss how enterprises can be prepared for the coming Internet of Things.

Getting ahead on medical device security

In this video, Jay Radcliffe, senior security researcher at Rapid7, discusses his recent work and how the industry needs to get ahead of the game when it comes to medical device security.

The industry's role in public safety

In this video, Joshua Corman, CTO at Sonatype, chats with SC Magazine's Danielle Walker on his involvement in some important upcoming initiatives.

Attack vectors and campaigns in 2014

In this video Teri Robinson sits with Jaime Blasco, director of AlienVault Labs, to discuss the prominent cyber criminal activity he and his team has witnessed this year.

Researcher discusses dynamic analysis of Flash files

In this video, F-Secure's Timo Hirvonen chats with Adam Greenberg, reporter at SC Magazine, about the project, as well as the threats aimed at Flash and Java vulnerabilities.

Threat expert demos the 'Backoff' POS malware

Karl Sigler, Threat Intelligence Manager at Trustwave, discusses the Backoff point-of-sale malware that was recently uncovered by Trustwave in collaboration with government agencies like the Secret Service.

Analyzing the 'Fake ID' Android vulnerability

In this video shot at Black Hat 2014 in Las Vegas, Jeff Forristal of Bluebox Security sits with Danielle Walker, reporter at SC Magazine, to discuss the Fake ID Android vulnerability.

2014 threat trends discussed at Black Hat 2014

In this video interview, SC Magazine's Teri Robinson discusses the latest threat trends with Seculert CTO Aviv Raff at the 2014 Black Hat conference in Las Vegas.

Black Hat 2014 Demo: EMV design flaws

In this video, AccessData's Lucas Zaichkowsky chats with SC Magazine's Danielle Walker on EMV design flaws.

Leveraging innovation to boost security

In this video, Peter Clay, CSG Invotas' new CISO, speaks with SC Magazine Reporter Danielle Walker to deliver some insight to security leaders.

Applying the cyber kill chain

In this video, SC Magazine chats with Chandra McMahon of Lockheed Martin on ways organizations can leverage the cyber kill chain in order to improve their detection, mitigation, and defense posture.

The evolving role of the CSO

In this video, SC Magazine's Danielle Walker interviews Trey Ford, global security strategist at Rapid7, to discuss the rapidly changing role of the CSO.