Expert analysis
Does application security pay?
The last decade has seen a dramatic shift in the way companies manage information security and protect vital data. In the past, businesses confronted the threat of cyber …
PacketWars: A cyber security sport for a cyber age
In this day and (cyber)age, hacking contests are sprouting like mushrooms after the rain – and it’s a good thing they do. For what better venue is there for …
How to choose a web vulnerability scanner
Robert Abela is a Technical Manager at Acunetix and in this interview he discusses the process of choosing a web vulnerability scanner and underlines several factors that …
Inside the mind of a computer forensics investigator
Jess Garcia, founder of One eSecurity, is a senior security engineer and an active security researcher in areas of incident response, computer forensics and honeynets. In this …
A closer look at NetShade for Mac
NetShade (v.4.0.1) makes your presence on the web anonymous by routing your connection through a proxy server and acting as the middle-man in your connection. The proxy server …
A closer look at Sophos Anti-Virus for Mac Home Edition
The Home Edition of Sophos’ Anti-Virus for Mac is a full-featured and free anti-virus solution for home users. It stops, quarantines and cleans up threats that try to …
Smart grid security facts
Tony Flick has worked for over eight years in the security industry and is currently a Principal with Tampa-based FYRM Associates. He has presented at Black Hat, DEF CON, …
No big bang in PCI 2.0
As expected, PCI 2.0 rolls up a number of minor changes, but there really is no Big Bang in this document. A number of people have been disappointed by this since for the past …
Fixing weak passwords
Passwords have been present in information technology since the earliest days, but it’s only in the last five years that computers have become powerful enough to crack …
Cloud security risks, benefits and cost savings
Harold Moss is the Emerging Tech & Cloud Computing Technical Architect, IBM Security Strategy. In this interview he talks about the security of cloud service providers, …
A closer look at Watchmac
Watchmac (v.1.6) is a handy piece of software that will tell you if someone has fiddled with your laptop while you were gone – moved it, removed its battery or unplugged …
Wireless security considerations
Brad Haines is chief researcher of Renderlab.net and a noted expert in the field of wireless security. Brad has spoken at many international conferences and taught several …
Featured news
Sponsored
Don't miss
- Ransom recovery costs reach $2.73 million
- What is cybersecurity mesh architecture (CSMA)?
- New SOHO router malware aims for cloud accounts, internal company resources
- Dropbox says attackers accessed customer and MFA info, API keys
- 2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element