Please turn on your JavaScript for this page to function normally.
Q&A: The critical infrastructure and digital security

Brian M. Ahern is president and CEO of Industrial Defender, the world’s fastest growing SCADA security company. In this interview, he discusses the security of critical …

A closer look at Folder Lock 6.2.1

Folder Lock is a Windows tool that enables you to create a password protected folder. The folder is completely hidden while it is locked, and the files, folders and drives …

Is your firewall a fire hazard?

Ask a firewall administrator to tidy up a rule base and get rid of every unused rule and object; or if you really want to make someone’s life miserable set them the task …

A closer look at Cryptainer PE 7.1

Cryptainer PE creates a secure container on your PC, using strong encryption. It creates new virtual drive letter(s), and all files that are added to this drive are encrypted …

The 5 essentials for safe online socializing

Social networkers beware: digital communities are facing increased online threats. The accessibility and popularity of networking sites are among the main reasons that these …

Infosecurity 2009 day two

Here’s a look at the second day of Infosecurity 2009 taking place in Earls Court – London, UK. You can watch the video from the first day here.

Infosecurity 2009 day one

Here’s a look at the first day of Infosecurity 2009 taking place in Earls Court – London, UK.

10 ways small business can improve security during a recession

Although many companies are understandably cutting back due to the current financial climate, IT security is one area companies cannot afford to. Protecting a company’s …

Is having a security policy in place really nine-tenths of the law?

Most large organizations maintain a detailed corporate security policy document that spells out the “dos and don’ts” of information security. Once the policy …

Information security recruitment: How to move on in turbulent times

Not surprisingly given the economic backdrop, the information security recruitment market has slowed. The first obvious signs of this downturn were evident from the third …

Productivity and Internet abuse: How to improve one by eliminating the other

It is not long ago that IT managers talked about web threats as mainly the downloading and viewing of inappropriate content in the workplace. However, times have changed and …

Q&A: Malware and Research

Roel Schouwenberg is the Senior Antivirus Researcher at Kaspersky Lab. Roel has nearly a decade of malware research and analysis experience. He monitors the state of malware …

Don't miss

Cybersecurity news