Please turn on your JavaScript for this page to function normally.
Safeguarding Your Data With TrueCrypt

There are countless reasons why you’d like to make sure your data stays private. Maybe you travel a lot and you’re worried your laptop may be stolen, perhaps you …

Showcase: Portable Security

At the RSA Conference 2008 in San Francisco we caught up with MXI Security. In this video you can see a showcase of their offerings related to portable security.

Information Assurance: National Security’s New Front Line

Nowadays, few would ever consider using the Internet “unprotected” without a reliable anti-virus software and firewall solution installed on their PC networks. Yet …

The Rising Trend of Internet Counter-Intelligence

All types of organizations – from Fortune 500 to “mom-and-pop” operations – have mandated the use of anti-virus, anti-adware, anti-spam, firewall and …

How To Protect Your Laptop From Prying Eyes With a Privacy Filter

While attending the RSA Conference show last month in San Francisco, we met a lot of people and talked with a number of companies. We brought home a large list of gadgets, …

The Enigma Machine

The National Security Agency (NSA) had an Enigma machine in their booth at the RSA Conference 2008 in San Francisco. Here’s a video that shows the machine and provides …

HNS Podcast: Jeremiah Grossman’s top security conferences

Jeremiah Grossman, the founder and Chief Technology Officer of WhiteHat Security attends quite a number of security conferences around the globe. A couple of weeks ago we had …

Interview with Josh Corman, Principal Security Strategist for IBM Internet Security Systems

Joshua Corman serves as Principal Security Strategist for IBM Internet Security Systems. With more than ten years of experience in security and networking software …

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications

The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P’, automatically generate an exploit for the potentially …

The Fundamentals of Physical Security

Deviant Ollam works as a network engineer and security consultant but his strongest love has always been teaching. A supporter of First Amendment rights who believes that the …

Changing Threats, Changing Solutions: A History of Viruses and Antivirus

It is more than 20 years since the first PC virus appeared. Since then, the nature of threats has changed significantly. Today’s threats are more complex than ever …

HNS Podcast: Penetration testing considerations

In this HNS podcast, Anothony Alves from CORE Security Technologies talks about penetration testing. He dicusses the things you should look for when considering doing a …

Don't miss

Cybersecurity news