Expert analysis
Q&A: Malware Trends
Marc Fossi manages research and development for Symantec Security Response where his primary role is executive editor of the Symantec Internet Security Threat Report. The …
Secure start-up for POS
Secure start-up of encryption services in a typical retail POS configuration can be provided by implementing the following (very general) best practices. Each Local Security …
Keeping Virtual Security Real
Remember the first time you drove a car on your own, and you’d get a kick from the sensation of sheer speed? Unfortunately, you also have to learn the mundane stuff like …
Q&A: Government Security and Mobile Devices
Joseph Hagin is the Former Deputy White House Chief of Staff. In that role he had a high-level of concern about hacking and other security concerns related to …
Towards Kerberizing Web Identity and Services
Today authentication and authorization are addressed in an incoherent, and often site-specific, fashion on the Internet and the Web specifically. This situation stems from …
Applied Binary Code Obfuscation
An obfuscated code is the one that is hard (but not impossible) to read and understand. Sometimes corporate developers, programmers and malware coders for security reasons, …
Q&A: RSA Conference 2009
Sandra Toms LaPedis, Area Vice President and General Manager of RSA Conferences, is responsible for global promotion and successful execution, including strategy, brand …
What the Heartland Data Breach Tells Us
The recent data breach at Heartland Payment Systems should make one thing clear: the standards for security around credit card numbers still aren’t good enough. New …
Code Review or WAFs? PCI 6.6
Short answer: both. Compliance with requirement 6.6 of the PCI DSS cites the use of either a web application firewall (WAF) or code review. It’s far more effective to …
Protecting SOA Against Internal Attacks
It is critical to have a good understanding of the data flow in order to select the optimal protection approach at different points in the enterprise. By properly …
Q&A: Current Security Threats
Simon Heron is an Internet Security Analyst at Network Box, a managed security company, where he is responsible for developing the overall business strategy and growth. In …
Web Application Firewalls and PCI DSS
We all know that time is a critical factor in selecting solutions to prevent breaches. Web Application Firewalls (WAF) are the most effective mechanisms to immediately address …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity