Please turn on your JavaScript for this page to function normally.
Cyber Security Coordination

There’s been much discussion of late regarding the perceived lack of expediency by federal agencies to identify and prioritize critical cyber infrastructure needs. The …

Q&A: iPhone Security and the Enterprise Market

Jesper Svegby is the Director of Business Development for the Mobile group at Check Point. With more than 10 years of experience in the Mobility and IT-security community …

PCI Compliance Explained

Learn about the Payment Card Industry Data Security Standard (PCI DSS), a security standard that includes requirements for security management, policies, procedures, network …

The Rise of User Circumvention and Risky Unauthorized Activities

In the new edition of the HNS podcast, Chris King from Palo Alto Networks discusses user circumvention – how end users are actively skirting IT security controls with …

Payment Card Industry Mandate Stresses Importance of Web Application Security: Recommended Becomes Required

On June 30, another refresh of the Payment Card Industry (PCI) Data Security Standards (PCI DSS) will upgrade Web application security testing from a best practice to a …

Q&A: E-mail Security Threats and Countermeasures

David Vella is the Director of Product Management at GFI with experience in quality assurance, network administration and software development. In this Q&A he provides …

Politically motivated Distributed Denial of Service attacks

In the new edition of the HNS podcast Dr. Jose Nazario, Arbor Networks senior security researcher, talks about politically motivated DDoS attacks around the world.

Blind SQL Injection Discovery And Exploitation Technique

This paper describes a technique to deal with blind SQL injection spot with ASP/ASP.NET applications running with access to XP_CMDSHELL. It is possible to perform a pen test …

Web application security landscape and trends

In the latest issue of the HNS Podcast, Mandeep Khera from Cenzic shares web application security trends observed by his company in the first quarter of 2008. Mr. Khera also …

The Botnet Business

Botnets have been in existence for about 10 years; experts have been warning the public about the threat posed by botnets for more or less the same period. Nevertheless, the …

Safeguarding Your Data With TrueCrypt

There are countless reasons why you’d like to make sure your data stays private. Maybe you travel a lot and you’re worried your laptop may be stolen, perhaps you …

Showcase: Portable Security

At the RSA Conference 2008 in San Francisco we caught up with MXI Security. In this video you can see a showcase of their offerings related to portable security.

Don't miss

Cybersecurity news