Please turn on your JavaScript for this page to function normally.
A closer look at Acunetix Web Vulnerability Scanner 6.5

Web applications are accessible 24 hours a day, 7 days a week and control valuable data since they often have direct access to backend data such as customer databases. SSL and …

Secure USB flash drives: Do you need one?

How many times have you used a USB flash drive at your offices? Hundreds? Thousands? Their sheer convenience makes usage almost second nature. But as often happens with IT …

Q&A: Malware threats, Windows 7 and cyber crime

Bo Olsen is a malware Researcher at Kaspersky Lab Americas. In this interview he discusses new malware threats, the problems the anti-malware industry faces today, Windows 7 …

Understanding the risks of cloud computing: Questions to ask your service provider

Cloud computing has changed the audit and risk profile of data systems in most organizations. Whilst the economics of going down the cloud route for data storage are highly …

DHS has a vision for stronger information security

It was not all corporate talk at the RSA Conference Europe 2009 this week in London. Attending one of the roundtables was Philip Reitinger, U.S. Department of Homeland …

Q&A: Security challenges in today’s economy

Dave Hansen is the Corporate Senior Vice President and General Manager, CA Security Management. In this interview, he discusses how the underground economy is impacting large …

Cloud computing is changing the enterprise landscape

At the RSA Conference Europe 2009, Qualys CEO Philippe Courtot gave an overview about how cloud computing is changing the enterprise security landscape. Mr. Courtot …

Q&A: Social networking privacy issues

Brian Honan is the founder of BH Consulting and head of Ireland’s first CERT team. As a speaker at RSA Conference Europe 2009 he discussed the danger of social networks …

The security implications of cloud computing

Nowadays, cloud computing is one of the most talked about topics that’s been the spark of many heated debates especially when it comes to security issues. In this …

Microsoft puts a spotlight on browser security

The Internet is growing. With the steady rise of the number of users from emerging markets getting computers and joining the online world, opportunities abound for the bad …

Gathering data and its security implications

At the RSA Conference Europe Advisory Board roundtable in London, new board members and experts Dr. Herbert Thompson and John Madelin, Verizon Business, headed a stimulating …

Q&A: Fuzzing

Ari Takanen is the CTO of Codenomicon and a regular speaker at security conferences. He’s presenting today at RSA Conference Europe and in this interview he discusses …

Don't miss

Cybersecurity news