Expert analysis
How to block Flash in Safari
I have been a satisfied Mac user for quite some time now. What I really love about Macs is that they just work. When you spend 10+ hours a day on your computer, you need for …
Security exercise for information infrastructure protection
“Cyber Europe 2010” – the first pan European CIIP (Critical Information Infrastructure Protection) exercise that will test the efficiency of communication …
How to cut costs and still remain secure
You’ve just heard your budgets have been cut once again! This time it’s across all IT and security has got to be slashed too. As a CISO or IT manager, or indeed a …
Are your organisation’s secrets actually secret?
If we look back over recent years, organizations quickly established databases for storing information and, with them, ways to mine these records to squeeze as much …
Sangria, tapas and hackers: SOURCE Barcelona 2010
I am writing this report sitting in an airplane on the tarmac of the Barcelona airport waiting for the traffic controller to give us the green light for departure. There are …
Today’s security landscape: Threats, data breaches and privacy
In this video recorded at the IBM Innovate 2010 conference, Jack Danahy, the Worldwide Security Executive, IBM/Rational at IBM, talks about current threats, data breaches and …
Vulnerability research and disclosure
Richard Brain is the Technical Director at ProCheckUp and in this interview he discusses vulnerability research, his favorite security tools, fuzzing as well as the …
Scaling intrusion prevention systems for 10G, 40G and beyond
The Internet is still growing and, as we make the transition from Intrusion Detection Systems (IDS) to Intrusion Prevention Systems (IPS) – driven in part by the fact …
Preparing for a firewall audit
Network security audits are getting a lot of coverage these days thanks to standards like SOX, PCI-DSS, and HIPAA. Even if you don’t need to comply with any of those …
An ounce of prevention is better than a pound of cure
The famous quote from Benjamin Franklin on prevention being better than a cure could easily be applied to the issue of corporate data losses. It’s far better to stop …
Q&A: RSA Conference Europe 2010
Linda Lynch is the RSA Conference Europe Manager and in this Q&A she provides an overview of this year’s event. Where do you see RSA Conference Europe fit in the …
Smartphone security risks and best practices research
ENISA is looking into smartphones and determining best practices for their use while researching the risks. Several manufacturers have been involved: RIM, Google, Microsoft, …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month