DIRECTOR'S CUT

Cyber intelligence in the private sector

In this interview, Jim Penrose, executive vice president at Darktrace, shares hows the industry can work to improve threat intelligence sharing, while maintaining client confidentiality.

Trends in organized bank fraud today

In this video, Tom Kellermann, chief cybersecurity officer at Trend Micro, discusses trending cybercriminal tactics in 2014, such as Island Hopping.

Reboot 2014: Industry experts discuss the year in security

In this video, some prominent information security professionals share their thoughts on prevalent threats in 2014 and what they think is to come in 2015.

Automating change to tackle advanced threats

In this interview, Chris Fedde, president of Hexis Cyber Solutions, addresses fears on how automated solutions can interfere with network operations.

Catching up with Yahoo CISO Alex Stamos

In this video, Ashley Carman, editorial assistant at SC Magazine, hears about Yahoo's future plans and Stamos' thoughts on the company's responsibility to keep users safe.

IBM previews 2014 CISO survey

In this video, Danielle Walker, senior reporter at SC Magazine, gets a sneak peek at an upcoming CISO survey conducted by IBM. Kris Lovejoy, general manager of security services at IBM, discusses the findings.

Preparing for the Internet of Things

In this video, John McCormack, CEO at Websense, sits with SC Magazine Senior Reporter Danielle Walker, to discuss how enterprises can be prepared for the coming Internet of Things.

Getting ahead on medical device security

In this video, Jay Radcliffe, senior security researcher at Rapid7, discusses his recent work and how the industry needs to get ahead of the game when it comes to medical device security.

The industry's role in public safety

In this video, Joshua Corman, CTO at Sonatype, chats with SC Magazine's Danielle Walker on his involvement in some important upcoming initiatives.

Attack vectors and campaigns in 2014

In this video Teri Robinson sits with Jaime Blasco, director of AlienVault Labs, to discuss the prominent cyber criminal activity he and his team has witnessed this year.

Researcher discusses dynamic analysis of Flash files

In this video, F-Secure's Timo Hirvonen chats with Adam Greenberg, reporter at SC Magazine, about the project, as well as the threats aimed at Flash and Java vulnerabilities.

Threat expert demos the 'Backoff' POS malware

Karl Sigler, Threat Intelligence Manager at Trustwave, discusses the Backoff point-of-sale malware that was recently uncovered by Trustwave in collaboration with government agencies like the Secret Service.

Analyzing the 'Fake ID' Android vulnerability

In this video shot at Black Hat 2014 in Las Vegas, Jeff Forristal of Bluebox Security sits with Danielle Walker, reporter at SC Magazine, to discuss the Fake ID Android vulnerability.

2014 threat trends discussed at Black Hat 2014

In this video interview, SC Magazine's Teri Robinson discusses the latest threat trends with Seculert CTO Aviv Raff at the 2014 Black Hat conference in Las Vegas.

Black Hat 2014 Demo: EMV design flaws

In this video, AccessData's Lucas Zaichkowsky chats with SC Magazine's Danielle Walker on EMV design flaws.