Expert analysis
Shaping the future of information security
Once again, the Innovation Sandbox proved to be one of the most interesting events at RSA Conference 2012, as ten creative companies got a moment in the spotlight to present …
Interview with Joe Sullivan, CSO at Facebook
Joe Sullivan is the Chief Security Officer at Facebook, where he manages a small part of a company-wide effort to ensure a safe internet experience for Facebook users. He and …
What is ISO 27001?
Learn the basics of information security and how to use ISO 27001 as a framework for managing information security management system. For more information and training, check …
Open source tool detects videoconferencing equipment vulnerabilities
Videoconferencing equipment has been in the news recently for its potential for use by attackers to snoop on confidential company meetings, view charts mounted on meeting room …
Why is residual risk so important?
The term “residual risk’ is mandatory in the risk management process according to ISO 27001, but is unfortunately very often used without appreciating the real …
Wireless security and the enterprise
Jesse Frankel is the head of the AirMagnet Intrusion Research Team. He has been working in various areas of wireless LAN technology and applications for more than 15 years. …
Questioning of incoming data crucial for security awareness
In the last six-to-twelve months, we have witnessed many different cyber attacks. Hacktivists were making a statement, the players behind the so-called Advanced Persistent …
Top disaster recovery issues
It is no surprise that disaster preparation is top of mind among people these days. The images and stories coming out of Japan following the devastating earthquake and tsunami …
How to foil targeted attacks
There are two types of targeted attacks aimed at organizations and companies: server-side and client-side. Server-side attacks consist of attacks on the organizations’ …
Is your online bank vulnerable to currency rounding attacks?
In the 12+ years of doing penetration tests against various critical environments, we’ve seen numerous online banking servers and found all sorts of vulnerabilities in …
5 reasons to enforce email monitoring
Managing storage continues to be one of the most significant challenges for email management, but the right tools can change this from a daily headache to an easy win. Email …
Securing Android for the enterprise
The numbers speak for themselves – Android’s share of the worldwide smartphone market is 52.5 percent, more than double compared to a year ago, according to recent …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)