Please turn on your JavaScript for this page to function normally.
Closing the last door

There’s always a risk of viruses lurking behind links on a website. Even well-known sites can contain dangerous links, especially those with a high level of public …

Fighting Web flaws is futile

Do you ever find yourself driving down the road in an unfamiliar place and you get that gut feeling that you’re headed in the wrong direction? Well, I feel that’s …

Advice on securing Web applications

In this podcast, Cenzic’s Mandeep Khera talks about the latest trends in Web application security. According to their latest report, 80 percent of published …

Cloud computing security: An insider’s view

As CSO of Qualys, Randy Barr is responsible for security, risk management and business continuity planning of the QualysGuard platform. In this video Randy talks about cloud …

Unlike popular belief, short links on Twitter aren’t malicious

Twitter recently announced that it has implemented a new security system to scan all URLs posted in tweets to protect users from malicious sites. This follows a similar …

A closer look at Steganos Safe

Steganos Safe creates a password-protected virtual safe to store your photos, music, documents, and more. It also shreds unwanted files permanently and defeats data recovery …

15 years of Infosecurity Europe

In this podcast, Laura Heather, Marketing Manager for Infosecurity Europe gives an update on this year’s event, which will be opening its doors on the 27th of April in …

What’s your SEO poison?

Search engine optimization (SEO) poisoning is an increasingly popular method of attack for cybercriminals and one that shows they are using more sophisticated techniques. In …

Q&A: Remote access and Entrust IdentityGuard

Mike Moir is a Product Manager for the Entrust IdentityGuard solution – a versatile authentication platform that meets diverse needs for strong second factor …

Is it safe to file your taxes online?

Tax season. It’s not a favorite time of year for most people, but the deadline for filing income taxes for many countries is quickly approaching. And, especially in …

On the origin of spam

So you received another spam e-mail message. On the surface it seems rather ordinary. It’s an advertisement for a handful of brand-name prescription drugs. When viewed …

Checklist to accelerate your software security efforts

In recent years, Software-as-a-Service (SaaS) has emerged as a viable application delivery method, and most enterprises are now including some SaaS software in their …

Don't miss

Cybersecurity news