Expert analysis
Scaling intrusion prevention systems for 10G, 40G and beyond
The Internet is still growing and, as we make the transition from Intrusion Detection Systems (IDS) to Intrusion Prevention Systems (IPS) – driven in part by the fact …
Preparing for a firewall audit
Network security audits are getting a lot of coverage these days thanks to standards like SOX, PCI-DSS, and HIPAA. Even if you don’t need to comply with any of those …
An ounce of prevention is better than a pound of cure
The famous quote from Benjamin Franklin on prevention being better than a cure could easily be applied to the issue of corporate data losses. It’s far better to stop …
Q&A: RSA Conference Europe 2010
Linda Lynch is the RSA Conference Europe Manager and in this Q&A she provides an overview of this year’s event. Where do you see RSA Conference Europe fit in the …
Smartphone security risks and best practices research
ENISA is looking into smartphones and determining best practices for their use while researching the risks. Several manufacturers have been involved: RIM, Google, Microsoft, …
How do we defend the Internet of the future?
As the Internet evolves, it will offer a vast array of possibilities such as new types of health services, personalized and mixed reality entertainment, and more. With new …
Inside backup and storage: The expert’s view
How much data do we create? How do we secure it? Store it? Retrieve it? When professional community Wikibon recently translated the amount of digital information that is …
Cloud security challenges and adoption
Jim Reavis is the Executive Director of the Cloud Security Alliance. In this interview he talks about cloud security challenges, cloud computing adoption in the enterprise as …
Securing new objects on the Internet landscape
By now, we are all used to hearing that the advent of mobile devices represents a network security nightmare, but they are hardly the only ones we need to worry about. Sensor …
Privacy expectations and the generation gap
Young people and old people use the Internet differently, and their privacy expectations vary. Young people are very fluent with social media – but not necessarily …
How CIOs can get things done with their reduced staff
It seems to me that we’re seeing more and more news of late about the lackluster job outlook. Unemployment will continue to be higher than originally forecasted and …
Behind the scenes and inside workings of a CERT
Brian Honan is the founder and head of Ireland’s first Computer Emergency Response Team (CERT) team as well as owner of BH Consulting. In this interview he discusses the …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025