Expert analysis
The complex world of endpoint security
Jeff Melnick is a Sales Engineer at NetWrix Corporation and in this interview discusses the intricate world of endpoint security, offers tips for IT security managers dealing …
Do I need a data center?
If you still own your own data center and this question has not already crossed your mind, then you might be spending more money than you need, subjecting your organization to …
Critical data exchange in the cloud
The pace of business today requires that critical information can be accessed anywhere, anytime. Furthermore, this sharing of information often happens amongst both internal …
Secunia’s role in vulnerability management
In the video below, Secunia CSO Thomas Kristensen talks about the company and their product line. Kristensen tackles the following questions: Tell us more about Secunia, and …
Social networks: An information security game changer
The Internet has revolutionized business and significantly cut costs in nearly every sector. An in-person bank transaction that costs the enterprise US $15 is only pennies …
Video: RSA Conference 2011 showcase
In this RSA Conference 2011 video showcase, you can check out the look and feel of the event and the expo floor. The companies featured in the video are Qualys, Secunia, …
A lesson to learn from the HBGary breach
As you might have already read, the HBGary and rootkit.com breach by Anonymous was not executed by using obscure techniques or unknown vulnerabilities – quite the …
SSL and the Internet: Where is it all going wrong?
Making sure that a web site is installed, configured and working correctly can be a daunting job for even the most experienced IT security professional. One of the most …
The dark side of the new Android Market
A new version of the Android Market has just been launched, making it possible for every device owner to look for applications, buy or even remotely install apps to an Android …
IT governance and mobile technology
The mobile world is undergoing explosive growth. Luckily, enterprises are beginning to realize the potential gains and losses this technology offers, enabling them to act …
Changing the status quo for security
When a problem is recognized that impacts virtually everyone and a group of experts provides a solution, what can possibly prevent the solution from being used? If the problem …
The vulnerability species: Origin and evolution
There is an on-going arms-race in the IT security industry between vendors striving to produce secure software, and researchers’ and cybercriminals’ efforts (and …
Featured news
Resources
Don't miss
- Microsoft May 2026 Patch Tuesday: Many fixes, but no zero-days
- Stealthy hackers exploit cPanel flaw in active backdoor campaign (CVE-2026-41940)
- Amazon Quick authorization bypass let users reach blocked AI chat agents
- Download: The IT and security field guide to AI adoption
- JetBrains TeamCity vulnerability allows privilege escalation, API exposure (CVE-2026-44413)