Expert analysis
Inside SANS London 2012
Matt Anderson is the Director, EMEA at SANS Institute. In this interview he talks about SANS London 2012, Europe’s biggest and most important information security …
5 bad things IT administrators do
Philip Lieberman is the President at Lieberman Software Corporation and in this video talks about five awful things that IT administrators do and offers ways to fix these actions.
Information-related risks, threats and compliance
Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is a member of the Commission on Cyber Security for the 44th President and several executive …
The QR code: A new frontier in mobile attackability
A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …
Solving the portable data security headache
Protecting intellectual property and sensitive information is a major security concern for any business today – especially against the backdrop of workers needing to …
Networkless working: The future of the public sector?
It is no secret that the UK Government is still running at a significant loss. It is therefore no surprise that organisations are having to cut costs, and for the public …
Preparing for your first security breach
So you’ve finally accepted it’s just a matter of time before you experience your first major breach. Despite all the work you’ve put in to your monitoring …
Fast and furious reverse engineering
Tomislav Pericin is one of the founders of ReversingLabs and the company’s Chief Software Architect. In this video, recorded at Hack in The Box Amsterdam 2012, he talks …
Proactive or reactive: Should that be the question?
For a number of years digital forensics has referred to “the application of computer investigation and analysis techniques to gather evidence suitable for presentation …
BYOD 2.0 and spotting the next big trend
In the 1960s and 70s the IT department was seen as a secret place ruled by powerful niche experts. They had total control of the department and who could access systems. The …
From identity and access solutions to access governance
The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of …
Automated hacking
The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month