Expert analysis
Automated hacking
The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An …
Provisioning is not access governance
Organizations of all sizes face ever-stricter regulatory and security requirements to protect their data, and that of their customers. But user provisioning systems alone …
Raising user awareness about privacy issues
In this age of social networks, discovering personal information about users has become increasingly easy to do, and that information can be misused at a later date for …
The evolving nature of hacktivism
A recent Anonymous video admits that they’ve been fairly quiet lately. From an American and Western European perspective, this is somewhat true. In 2010, Anonymous built …
10 steps to ensure users only access what they need
Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …
Burning enterprise authentication issues
Threats keep evolving and are becoming more invasive, targets now go beyond the financial industry and involve any company that has sensitive information – whether its …
Hardening Windows processes
Didier Stevens is an IT security consultant working for a large financial corporation in Belgium. In this video recorded at Hack in The Box 2012 Amsterdam, Didier talks about …
Vulnerability disclosure framework for industrial control systems
The Industrial Control Systems Joint Working Group (ICSJWG) published “The Industrial Control Systems Common Vulnerability Disclosure Framework”, which is a …
Modern day pirates
Many of you will remember long summer days with the streets filled with laughing children congregating to play football or just hang out with their friends – I certainly …
Overcoming the hacker hurdle during the Olympics
During the Beijing Olympics it’s reported there were upwards of 12 million “cyber security incidents” per day . Hacking has evolved tremendously since …
Five steps for a secure cloud transition
Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest …
What’s going on with the Cybersecurity Act of 2012?
This week we have witnessed a heated debate between US Senators who showed opposite opinions on the Cybersecurity Act of 2012, a bill aimed at regulating a number of important …
Featured news
Resources
Don't miss
- Microsoft May 2026 Patch Tuesday: Many fixes, but no zero-days
- Stealthy hackers exploit cPanel flaw in active backdoor campaign (CVE-2026-41940)
- Amazon Quick authorization bypass let users reach blocked AI chat agents
- Download: The IT and security field guide to AI adoption
- JetBrains TeamCity vulnerability allows privilege escalation, API exposure (CVE-2026-44413)