Expert analysis
Requirements of cloud-based network security
While some of the technical underpinnings that make up the cloud’s “secret sauce’, are relatively recent innovations, the business case for managing critical …
Weather forecast: Cloudy with a chance of compliance
If there are constants to every information security conference, they are these: threats are up and the job of the average security professional becomes more demanding every …
How to protect employees with a web filtering solution
Let’s face it, this is not your father’s Internet (or, for those of us who first went online in the late 90’s, even John Postel’s Internet.) As …
Best practices in approaching vendor risk assessment
When it comes to vendor risk assessment, a one-size-fits-all approach is not the way to go. Every vendor you bring into your organization will add its own unique set of risks …
How to become a published author in information security
A large security event is always filled with exceptionally clever attendees who are writers in one way or another. Some produce training materials for their employers, others …
The value of your credentials
As surprising as this may sound, earlier this year stolen twitter credentials were valued at almost $1,000. When compared to credit card details that fetch less than $1, why …
How to sell security to senior management
While companies know they have to invest in IT to do their jobs, IT security always ends up looking like an added cost in the eyes of the management. So, what are the things …
Application security: The good, the bad and the ugly
What is the actual state of application security today? Veracode has tested over 2,900 applications using it cloud-based platform, employing static and dynamic analysis (web …
A closer look at SafeCopy Backup
SafeCopy Backup is an online backup service that allows you to backup files from an unlimited number of Windows and Mac computers and mobile devices, to access them from …
Facebook: The rise of the privacy killer
Privacy should be a human right, and we should be able to see our data, challenge it, change it and delete it. Still, we’re not in charge of our personal information at …
The look and feel of RSA Conference Europe 2010
Held at the Hilton London Metropole hotel, this year’s European edition of the RSA Conference has gathered many security practitioners, enticed by the promise of an …
Developing a secure product lifecycle for Flash content
In this podcast recorded at the RSA Conference 2010 that started today in London, Peleus Uhley, Platform Security Strategist for Secure Software Engineering at Adobe talks …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025