Expert analysis
A closer look at Gili USB Stick Encryption 2.0
USB flash drives are the most popular way to move data from one PC to another. They are easy to use, convenient, affordable, but at the same time they pose a security risk and …
Q&A: Hackers and experimental artists
The “Noise vs. Subversive Computing” project is a collaborative release between noise and experimental artists working with subversive technologists and computer …
Identity theft in focus
The stories are all too familiar: Money siphoned from a checking account. Unfamiliar charges racked up on a credit card bill. Discovering a loan has been taken out under false …
What you need to know about backing up virtual machines
The benefits of using virtualization to consolidate data center infrastructure and provide a more flexible platform for moving, provisioning and backing up workloads are …
Online fraud: Avoiding the seven deadly sins
By using the points below, companies transacting online can reduce the threat of fraudulent purchases or unauthorized account access and ensure a safer experience for their …
How to prevent identity theft
Identity thieves use low-tech methods (stealing your wallet or even eavesdropping at key moments) as well as sophisticated Internet scams to rob people of their sensitive …
Q&A: Cyber threats
Mohd Noor Amin is the Chairman of IMPACT and heads the world’s largest public-private partnership against cyber threats. In this interview, he discusses the issues …
Migrating to Windows 7: A three step plan
With the release of Microsoft’s new Windows 7 operating system, many IT managers will be thinking about when to make the move to the new OS and how to make the process …
Q&A: Security testing methodologies
Jon Clay is the Senior Core Technology Marketing Manager at Trend Micro and in this interview he discusses current testing methodologies in the security industry, their good …
Q&A: Insider bank fraud
Shirley Inscoe is the Director of Financial Services Solutions at Memento. Before this, she worked at Wachovia Bank for 29 years. Shirley co-authored the book …
Securing the foundation of IT systems
Recent studies show that securing the operating system is recognized as a necessary practice in an organization’s overall security policy, but it is not being done on a …
Q&A: Digital signatures and use cases for Adobe CDS
Steve Duncan is the Director of Entrust Certificate Services. Entrust Certificates for Adobe CDS enable organizations to use digital signatures to sign Adobe PDF files with …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month