Expert analysis
BlindElephant: Open source web application fingerprinting engine
In this video recorded at Black Hat USA 2010, Patrick Thomas, a vulnerability researcher at Qualys, discusses the open source web application fingerprinting engine …
Q&A: SOURCE Barcelona
Stacy Thayer is the Founder and Executive Director of SOURCE Conferences. Prior to founding SOURCE Conferences, Stacy was employed for a Fortune 500 company, where she worked …
How to clean up a firewall rulebase
Over time, firewall rule bases tend to become large and complicated. They often include rules that are either partially or completely unused, expired or shadowed. The problem …
A closer look at Panda Cloud Antivirus Free Edition
Panda Cloud Antivirus (v.1.1.2) consists of a lightweight antivirus agent that is connected in real-time to PandaLabs’ online Collective Intelligence servers for a …
Q&A: Strong authentication
Mike Moir is a Product Manager for the Entrust IdentityGuard solution. In this interview he talks about strong authentication. Based on your experience, how critical is …
Secure by design
In this video recorded at the IBM Innovate 2010 conference, David Grant, the Director of Security Solutions at IBM Rational, talks about how software is the invisible thread …
Q&A: Sandbox for Adobe Reader
Didier Stevens is an IT security consultant well-known for his research into malicious PDF files. Since Adobe announced a sandbox for Adobe Reader, it was a perfect …
Can you trust a product that doesn’t have the right certification?
There are numerous organizations who, when looking for a new solution, will draw up a list of attributes products must have to proceed to the evaluation phase. FIPS …
A closer look at F-Secure Anti-Virus 2010
F-Secure Anti-Virus 2010 protects your computer against viruses, spyware, infected e-mail attachments, and other malware. It uses DeepGuard cloud computing technology to …
How to unlock the power of cloud computing
Which IT sector accounts for fully 25% of the industry’s year-over-year growth and, if the same growth trajectories continue, will generate about one-third of the IT …
20 ways to lose your database
Arguably an organizations’ most vital asset is its databases, often containing sensitive financial information, customer and employee data and intellectual property. …
A closer look at Rohos Logon Key for Mac
Rohos Logon Key for Mac (v2.3) can turn any USB flash drive, iPod, Bluetooth enabled mobile, iPhone, YubiKey, UmiKey, Swekey OTP token, or Touchatag device with RFID tags into …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025