Expert analysis
Q&A: Malware and Research
Roel Schouwenberg is the Senior Antivirus Researcher at Kaspersky Lab. Roel has nearly a decade of malware research and analysis experience. He monitors the state of malware …
Restricted budgets and information security
With the unraveling of the global financial system in 2008, analysts are confidently predicting that the real economy will experience a significant recession in 2009 and …
Q&A: Information Security Threats and Management
Ron Meyran, Security Product Manager at Radware, a provider of integrated application delivery solutions for business-smart networking, discusses the most significant …
Data leakage prevention: From target to integration
The specifics of Data Loss Prevention projects are such that besides improving company’s data system infrastructure and choosing the technical solution it is necessary …
The growth of keyloggers
Enterprise security has traditionally been centered around gateway protection, preventing unauthorized access from the outside and securing access to the Internet from inside …
Combating the rising cybercrime trend with SIEM
Judging from articles in the press, there appears to be a steady increase in the frequency of cybercrime. Whether it is one country attacking the infrastructure of another, or …
Security threats: A guide for small and medium businesses
A successful business works on the basis of revenue growth and loss prevention. Small and medium-sized businesses are particularly hit hard when either one or both of these …
The economy and cyber crime
In this uncertain global economy, you can count on one thing: crime – both in the real world and the online one – has the opportunity to thrive. According to a …
Banning wireless doesn’t stop users
Wireless LANs (WLANs) are increasingly becoming a commodity in the home, in the high street, at the airport – everywhere but in the office it seems. This is because it …
What to do about social networking in your company
The growing popularity of social networking sites such as Facebook is slowly developing into a massive headache for IT administrators as employees spend time updating their …
Q&A: Malware Trends
Marc Fossi manages research and development for Symantec Security Response where his primary role is executive editor of the Symantec Internet Security Threat Report. The …
Secure start-up for POS
Secure start-up of encryption services in a typical retail POS configuration can be provided by implementing the following (very general) best practices. Each Local Security …
Featured news
Sponsored
Don't miss
- CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040)
- The rising influence of AI on the 2024 US election
- 10 colleges and universities shaping the future of cybersecurity education
- What is multi-factor authentication (MFA), and why is it important?
- MITRE breached by nation-state threat actor via Ivanti zero-days