Expert analysis
Hacker to business owner: Spotting innate talent in others
There has been much debate recently in the UK about the current GCSE exam format. On the one side are those that argue it should be scrapped in favour of a complex testing …
Wolfgang Kandek presents new Qualys offerings
During RSA Conference 2013 in San Francisco, presented several news announcements. In this video, Qualys CTO Wolfgang Kandek discusses the expanded FreeScan service, the …
The SCADA security challenge
One of the less well-known aspects of information technology – but arguably one of the most critical to modern businesses – is the SCADA platform. SCADA stands for …
The Chinese time bomb
At Seculert, when we analyze a targeted attack, we are trying to help our customers understand the intention of the attackers, as we look how the attack evolves over time. In …
Open standards are key for security in the cloud
The current divide between proprietary and open approaches to enterprise cloud computing has implications beyond the obvious. More than just issues of cloud interoperability …
IT complexity and change auditing
Robert Bobel is the Director of Product Management at NetWrix. In this interview he talks about change auditing trends, enterprise security issues, increasing IT complexity …
Video: RSA Conference 2013 showcase
The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2013. Here’s a closer look at the show. For …
Separating single sign-on myths from fact
Single Sign On (SSO), the ability to authenticate only once and have automatic access to many systems, has many potential benefits ranging from lower IT overhead costs to …
Security pros should listen with their heads, not their hearts
There is a phrase that has become quite popular in information security circles and it goes along the lines of “there are two types of organizations, those that have …
Unintended, malicious and evil applications of augmented reality
Most new products begin life with a marketing pitch that extols the product’s virtues. A similarly optimistic property holds in user-centered design, where most books …
The privacy cliff and how not to fall off it
We are all hearing the phrase “fiscal cliff” considerably more times than is useful. So far, however, nobody’s mentioned a “privacy cliff.” They …
Document shredding: the why and the how
Tim McBride serves as the Vice President and General Manager of Secure Destruction Services for Recall North America. He is focused on driving improvements in safety, …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)