Expert analysis
IPv6 reputation is doable
The Internet has grown beyond what anybody involved in its early development could have imagined. Who would have thought that a network developed in the 1970s for government …
Security auditing tools and challenges
James Tarala is a principal consultant with Enclave Security. He is a regular speaker and senior instructor with the SANS Institute as well as a courseware author and editor …
Web application security trends and issues
In this podcast, Mandeep Khera from Cenzic talks about web application security trends and issues. Web applications are the weakest link in the security chain – and it …
How secure is your browser?
Qualys CTO Wolfgang Kandek talks about research which clearly shows that browser security is alarmingly bad. Browsers and plug-ins are frequently outdated and easily attacked. …
The expanding role of digital certificates… in more places than you think
A scribbled signature may have been enough to verify your identity 20 years ago, but today’s online world requires more advanced — and authenticated or encrypted — …
Five security secrets your IT administrators don’t want you to know
As valued members of your organization, IT administrators work every day to keep your infrastructure up and available. But in today’s rush to contain operational costs, …
A closer look at MacKeeper
MacKeeper (v1.0.3.) is a comprehensive bundle of various system utilities that will help you keep your Mac secure from malware; find it if it gets stolen; backup, restore, …
Cenzic at a glance
John Weinschenk, President & CEO of Cenzic, talks about the company and their product line. Cenzic is a provider of software, managed service, and cloud security products …
IronBee versus ModSecurity
After spending a couple of weeks talking about IronBee to anyone willing to listen, I have assembled a list of commonly asked questions. Not unexpectedly, the question that …
Penetration testing and certification
Stephen Sims works at Wells Fargo in San Francisco as a security architect and is a certified instructor for the SANS Institute. In this interview he discusses the …
The fundamental failure of endpoint security
According to Stefan Frei, Research Analyst Director with Secunia, it’s not the vulnerabilities in Microsoft’s products we should worry about, but those in …
Evaluate the effectiveness of your cyber armor
When evaluating our effectiveness in dealing with cyber defense, we have two layers of uncertainty and risk: how effectively are we protecting critical information, and what …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025