Expert analysis
Security threats: Unwrapping 2011
2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …
The future of identity verification through keystroke dynamics
When someone mentions biometrics, the first (and sometimes the only) thing that comes to mind to many people are physical characteristics on the basis of which people can be …
Security precautions for mobile business applications
Mobile applications have become one of the hottest trends, but this has come at a price. The sharp rise in popularity means businesses are rushing their apps to the market, …
The mobile security conundrum
Whilst the range and variety of IT security defenses for portable computers – that’s netbooks and laptops to most people – is excellent, and able to cater …
Will we finally see a federal data breach notification law?
Embarrassing losses of personal data, whether due to intrusions into computer networks or sheer carelessness, seemingly are weekly news fodder. The recent PlayStation data …
Business continuity: You need more than just a plan
Stop for a moment and take a look around you – IT isn’t just the computer on your desk, the lap top in your bag or the mobile in your pocket. The truth is …
25 years of mobile security
This year marks the 25th anniversary of my first foray into mobile security. True story. Back in the day, the early halcyon days of mobile computing, any device weighing in at …
A closer look at MainMenu Pro
MainMenu Pro (v3.0.3) is a maintenance tool for the Mac. It enables you to keep your Mac in shape by reclaiming unused disk space, speeding the launch of application, cleaning …
Email archiving challenges
Brian Azzopardi is the product manager for GFI MailArchiver. In this interview he discusses the challenges related to managing email growth and how archiving can help. Why …
Securing the virtual environment
In this video, Dimitri McKay, Security Architect at LogLogic, talks about vulnerabilities and the security challenges surrounding virtual environments: hyperjacking, VM …
WebGL: A new dimension for browser exploitation
WebGL is a new web standard for browsers which aims to bring 3D graphics to any page on the internet. It has recently been enabled by default in Firefox 4 and Google Chrome, …
Governance on unstructured data
Businesses face challenges when implementing sound policies for dealing with their unstructured data, an ever-present thorn in the side of most enterprises today. It is …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025