Expert analysis
Questioning of incoming data crucial for security awareness
In the last six-to-twelve months, we have witnessed many different cyber attacks. Hacktivists were making a statement, the players behind the so-called Advanced Persistent …
Top disaster recovery issues
It is no surprise that disaster preparation is top of mind among people these days. The images and stories coming out of Japan following the devastating earthquake and tsunami …
How to foil targeted attacks
There are two types of targeted attacks aimed at organizations and companies: server-side and client-side. Server-side attacks consist of attacks on the organizations’ …
Is your online bank vulnerable to currency rounding attacks?
In the 12+ years of doing penetration tests against various critical environments, we’ve seen numerous online banking servers and found all sorts of vulnerabilities in …
5 reasons to enforce email monitoring
Managing storage continues to be one of the most significant challenges for email management, but the right tools can change this from a daily headache to an easy win. Email …
Securing Android for the enterprise
The numbers speak for themselves – Android’s share of the worldwide smartphone market is 52.5 percent, more than double compared to a year ago, according to recent …
Mobile application security risks
Security experts have already agreed on the fact that the increased use of personal mobile devices and smartphones for work purposes is one of the biggest threat to the …
The challenges of setting up a security conference
In this podcast recorded at the SecurityByte conference held this year in Bangalore, India, the conference founder Nishchal Bhalla talks about his motivations for organizing …
A new perspective on the insider threat
When talking about the insider threat, the first that comes to mind to many (if not all) information security professionals is the threat posed by rogue insiders that …
The multiple dimensions of corporate espionage
You’ve spent months fixing the red items on an internal audit report and just passed a regulatory exam. You’ve performed a network vulnerability assessment and …
PCI DSS is working, but there are challenges to overcome
Recent figures from the UK Cards Association showed that banking industry initiatives, including PCI have been successful in decreasing the volume of card and bank account …
Top 10 HTML5 threats and attack vectors
Emerging as popular standard to create Rich Internet Applications and competing with technology stacks like Adobe’s Flex/Flash and Microsoft’s Silverlight is …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025