Expert analysis
How do we defend the Internet of the future?
As the Internet evolves, it will offer a vast array of possibilities such as new types of health services, personalized and mixed reality entertainment, and more. With new …
Inside backup and storage: The expert’s view
How much data do we create? How do we secure it? Store it? Retrieve it? When professional community Wikibon recently translated the amount of digital information that is …
Cloud security challenges and adoption
Jim Reavis is the Executive Director of the Cloud Security Alliance. In this interview he talks about cloud security challenges, cloud computing adoption in the enterprise as …
Securing new objects on the Internet landscape
By now, we are all used to hearing that the advent of mobile devices represents a network security nightmare, but they are hardly the only ones we need to worry about. Sensor …
Privacy expectations and the generation gap
Young people and old people use the Internet differently, and their privacy expectations vary. Young people are very fluent with social media – but not necessarily …
How CIOs can get things done with their reduced staff
It seems to me that we’re seeing more and more news of late about the lackluster job outlook. Unemployment will continue to be higher than originally forecasted and …
Behind the scenes and inside workings of a CERT
Brian Honan is the founder and head of Ireland’s first Computer Emergency Response Team (CERT) team as well as owner of BH Consulting. In this interview he discusses the …
Malware detection with Neptune
In this video recorded at Black Hat USA 2010, Rami Kawach, a software architect at Qualys, talks about Neptune – a project to build an automatic malware analysis engine …
Corporate espionage for dummies: HP scanners
Web servers have become commonplace on just about every hardware device from printers to switches. Such an addition makes sense as all devices require a management interface …
A closer look at GFI Backup 2010 Business Edition
Through GFI Backup’s central web-based administration console, administrators can configure and implement company-wide backup policies in a single task. Additionally, …
Network security challenges faced by universities
Striking a balance between an open yet secure network remains a challenge for university IT departments. While universities are often on the cutting edge of innovation, they …
Building secure software using fuzzing and static code analysis
The increased complexity of new technologies and faster software release cycles are making traditional reactive security solutions ineffective. Instead, more adaptable, …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month