Black Hat 2012: Rodrigo Branco on new malware research database

Black Hat 2012: Rodrigo Branco on new malware research database

Black Hat 2012: Rodrigo Branco on new malware research database

Date: Jul 27, 2012

In this interview with SearchSecurity.com News Director Robert Westervelt, Rodrigo Branco, director of vulnerability and malware research at Redwood City, Calif.-based Qualys Inc., discusses his new malware analysis system.

The malware research database, which already contains hundreds of thousands of malcode samples, is intended to help security researchers develop and share new analysis capabilities faster and more easily. Here, Branco discusses how the system works, the difficulty level involved with reverse-engineering malware, and new insights on malware he's gleaned so far.

Editor's note: For more news, analysis, commentary and video interviews from Las Vegas, visit SearchSecurity.com's Black Hat 2012 special coverage page.

More on Vulnerability Risk Assessment

  • canderson

    How involved should execs be in software security programs?

    VIDEO - Video: Chris Wysopal of Veracode discusses how the role of security executives is evolving in application security and vendor management.
  • canderson

    The gaping hole in your vulnerability management program

    VIDEO - Authenticated vulnerability scanning may be just what your organization needs to complete its vulnerability management program. In this video, expert Kevin Beaver offers pointers for performing an authenticated vulnerability scan.
  • canderson

    How to make penetration test results matter

    VIDEO - Voodoo Security founder Dave Shackleford details how enterprises can make penetration test results more meaningful than a compliance exercise.
  • Cybersecurity risks masked by controversial vulnerability counts

    News - Experts have split opinions regarding the correct methodology for counting vulnerabilities, but all agree that focusing on numbers can mask real cybersecurity risks.

    ( Apr 13, 2015 )

  • How to conduct proper AWS vulnerability scanning

    Tip - Vulnerability management in the cloud can be complicated. Expert Rob Shapland explains how to perform vulnerability scans in AWS under the shared responsibility model.
  • attack surface analysis

    Definition - An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering. Attack surface analysis allows the organization to detect those vulnerabilities.
  • Is the RSA 2015 'booth babe' ban a win for women in security?

    News - News roundup: The ban of "booth babes" at RSA Conference 2015 has been met with praise; does it equal an increase of women in infosec? Plus: Cyberthreat data-sharing bill advances; Flash flaw exploited days after patching; new twist on Google Play app vetting.

    ( Mar 27, 2015 )

  • Embedded systems security a growing concern amid rise of IoT

    News - As more devices become Internet-enabled, experts fear an embedded systems security worst-case scenario for enterprises, many of which are unaware of the risks or unable to mitigate them.

    ( Mar 23, 2015 )

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: