Please turn on your JavaScript for this page to function normally.
Q&A: Cyber threats

Mohd Noor Amin is the Chairman of IMPACT and heads the world’s largest public-private partnership against cyber threats. In this interview, he discusses the issues …

Migrating to Windows 7: A three step plan

With the release of Microsoft’s new Windows 7 operating system, many IT managers will be thinking about when to make the move to the new OS and how to make the process …

Q&A: Security testing methodologies

Jon Clay is the Senior Core Technology Marketing Manager at Trend Micro and in this interview he discusses current testing methodologies in the security industry, their good …

Q&A: Insider bank fraud

Shirley Inscoe is the Director of Financial Services Solutions at Memento. Before this, she worked at Wachovia Bank for 29 years. Shirley co-authored the book …

Securing the foundation of IT systems

Recent studies show that securing the operating system is recognized as a necessary practice in an organization’s overall security policy, but it is not being done on a …

Q&A: Digital signatures and use cases for Adobe CDS

Steve Duncan is the Director of Entrust Certificate Services. Entrust Certificates for Adobe CDS enable organizations to use digital signatures to sign Adobe PDF files with …

Looking back at spam in 2009

At the end of last year, it was predicted spam volumes would rise slightly higher than 95 percent in 2009 because of a growing use of botnets. Let’s see if the …

Safety in the cloud

It’s a common scenario right now, played out in executive suites across the country. A company is looking to cut back on expenses and overhead. IT, with its myriad of …

Q&A: Web application scanning

Mike Shema is the Web Application Security Engineer at Qualys. In this interview, he discusses the challenges related to effective Web application scanning, the way a Web …

Changes coming to the OWASP Top 10 in 2010

In the spirit of improving Web application security worldwide the folks at OWASP have released the OWASP Top 10 2010 “release candidate”. It’s currently open …

Privacy in the spotlight: 8 million reasons

There is an all-around media frenzy going on about the 8 million GPS location requests that Sprint Nextel received and automatically granted through a web portal to law …

Microsoft’s security patches year in review: A malware researcher’s perspective

It’s no secret that Microsoft has had the lion’s share of security vulnerabilities. Its success as a company has made it the most obvious and profitable target for …

Don't miss

Cybersecurity news