Please turn on your JavaScript for this page to function normally.
Q&A: Mainframe security

David Hodgson is a Senior Vice President of Development at CA within the Mainframe Business Unit, responsible for the company’s security management and database …

Importance of educating your employees on basic security principles

In this edition of the HNS podcast, David Kelleher, communications and research analyst at GFI Software discusses the need for companies to educate their employees on basic …

A closer look at AVG Anti-Virus Free Edition 8.5

AVG Free Edition is a well-known antivirus protection tool and is available free of charge to home users for the life of the product. Highlights include automatic update …

Q&A: Brand and reputation protection

Michael R. Stanfield is the Chairman and CEO of Intersections, a provider of consumer and corporate identity risk management services. In this interview he discusses brand and …

Business Model for Information Security

During the Infosecurity Europe 2009 conference in London, we talked with Ron Hale, Director of Information Security Practices at ISACA. ISACA is a well known worldwide …

Q&A: Security threats to financial organizations

Ori Eisen is the founder and Chief Innovation Officer of 41st Parameter. In this interview he discusses the security threats to financial organizations and their customers, …

SSH Solutions with CEO George Adams

George Adams, the President and CEO of SSH Communications Security, discusses their solutions for securing and managing data in enterprise networks. This includes the new SSH …

A closer look at Avira AntiVir Personal Free Antivirus 9

Avira AntiVir Personal Free Antivirus is a comprehensive, easy to use antivirus program for home-users only. It offers malware recognition of viruses, Trojans, backdoor …

Waging war on cyber threats

The Obama Administration did what many in the political and national security arenas have been advocating for some time – make Cybersecurity its own Department of …

Q&A: Analyzing the security, compliance and cost benefits of tokenization

Tokenization has been billed as the magic data security bullet for retailers, offering strong protection for stored sensitive data and an attractive cost-saving strategy for …

The role of encryption in database security

For many organizations, databases are a treasure trove of sensitive information containing data ranging from customers’ personal details and confidential competitive …

Securing Web 2.0: Writing’s on the wall

Love or loathe it, businesses can’t ignore the Web 2.0 phenomenon. As LinkedIn, Facebook, Twitter, wikis, blog sites, Flickr, music sharing and other collaborative …

Don't miss

Cybersecurity news