Expert analysis
Building C-Level Confidence with a Security Blueprint
IT professionals wear many hats these days. Not only are they charged with keeping the lights on, they must establish and maintain a defined security posture, ensure …
Q&A: Threats to the US critical communications infrastructure
Paul Parisi is the CTO of DNSstuff.com and has an extremely broad and deep technical background offering reality based solutions to everyday issues. In this interview he …
European Network and Information Security Agency (ENISA)
In this video, Andrea Pirotti, the Executive Director of ENISA, introduces the agency and its work.
Biometric Security for Financial Meltdown Solutions
Wall Street was dominated by 5 major investment banking firms at the beginning of 2008. Nine months later, only 2 of these investment banking firms remain. This is probably …
Network and information security in Europe today
In mid Septeber, the 1st NIS Summer School jointly organized by the European Network and Information Security Agency (ENISA) and the Institute of Computer Science of the …
Q&A: Security Visualization
As chief security strategist and director of application product management, Raffael Marty is customer advocate and guardian – expert on all things security and log …
Q&A: Virtualization Security
Jim Chou is the Executive VP of Technology for Apani where he is responsible for the strategic technical development of Apani technology and product portfolio development. In …
Types of Web-Based Client-Side Attacks
While my research is primarily concerned with drive-by-download attacks, I thought I try to summarize other web-based client-side attacks that are out there, many of which are …
SOX, Lies and Security Matters
When it comes to compliance, it’s fairly easy to find out what companies need to do to achieve it. But it’s much harder for companies to find out how they should …
Discovery and Fuzzing for SQL injections with Web 2.0 Applications
Web 2.0 application assessment is becoming increasingly challenging due to their behavior and implementation of the components. It is imperative to identify hidden Web 2.0 …
Rootkit Evolution
I saw my first rootkit in 2004, when I was still a rookie virus analyst. At that point I had some vague knowledge of UNIX-based rootkits. One day I stumbled on an executable …
Application Security Matters: Deploying Enterprise Software Securely
One of the most interesting aspects of being an information security consultant is the exposure to an enormous variety of industries and organizations. From health care to …
Featured news
Sponsored
Don't miss
- The rising influence of AI on the 2024 US election
- 10 colleges and universities shaping the future of cybersecurity education
- What is multi-factor authentication (MFA), and why is it important?
- MITRE breached by nation-state threat actor via Ivanti zero-days
- The first steps of establishing your cloud security strategy