Please turn on your JavaScript for this page to function normally.
Q&A: InfoSec World Conference

Dina Dvinov is the Conference Marketing Manager at the MIS Training Institute and in this interview discusses the InfoSec World Conference. Introduce InfoSec World Conference …

A closer look at Comodo Dragon 1.0.0.5

Comodo Dragon is a recently released free Internet browser constructed on the open source Chromium Project browser. The installation process is simple and fast. You will be …

Undetected data breaches are the ones that hurt the most

File transfer technologies have been around for over 30 years, but recent evolutionary changes in business needs have resulted in significant improvements to file transfer …

Fuzzing: Build security in

The greatest security challenge today is discovering new vulnerabilities. Software release cycles are getting faster and new technologies are increasingly complex, a perfect …

Policing your IT police: Proactive security

When the global economy is in slowdown, there’s one sector that remains buoyant: crime. Illegal and illicit activities invariably rise as legitimate business falls, so …

A closer look at System Surveillance Pro 5.5

System Surveillance Pro logs keystrokes, monitors applications, tracks visited websites, records instant message conversations and captures screenshots of the computer …

Exploring the boundaries of IT security

As Niels Bohr once said, prediction is difficult, especially about the future. Nevertheless, almost all network security companies try to assess risk and the potential impact …

Backup WordPress automatically with Backupify

You backup your computer, but do you backup your online activities? The typical Internet user nowadays uses a variety of services such as Flickr or Twitter, runs a WordPress …

Q&A: SOURCE Conference

Stacy Thayer is the Founder and Executive Director of SOURCE Conferences. Prior to founding SOURCE Conferences, Stacy was employed for a Fortune 500 company, where she worked …

Tokenization: A new approach to enterprise data security

As enterprises seek to protect data from cybercriminals, internal theft or even accidental loss, encryption and key management have become increasingly important and proven …

Google Buzz for spammers

The Google Buzz sign-up is being advertised to users when logging into Gmail, and is a fairly transparent process to users with an existing Gmail account. Clicking on …

Will virtualization and cloud computing change how we achieve security?

The virtues of virtualization and cloud computing will figure in most enterprise IT infrastructure discussions during 2010. Virtualization has already proven its worth in …

Don't miss

Cybersecurity news