Expert analysis
Q&A: Ubuntu 9.10 security
Kees Cook is the security engineer and Gerry Carr is the head of platform marketing at Canonical. In this interview they discuss the security improvements in Ubuntu 9.10, the …
Ask the social engineer: Practice
One reader wrote in asking: “How can one practice social engineering before using it in the wild?” Answering is Chris “loganWHD” Hadnagy, the lead …
Embracing tokenization: Payment without pain
Today, it’s expected that merchants accept electronic payments. It’s more than expected that those payments are secure. No data leaks or breaches of any kind. The …
Q&A: Hard drive encryption
Dave Anderson is Director, Strategic Planning for Seagate and is involved in developing the opportunities for hard drives to contribute to system security. In this interview …
5 handy WordPress security plug-ins
WordPress is one of today’s most popular publishing platforms. Like any other system, it needs security. What follows is a list of 5 practical plug-ins that extend its …
A closer look at Acunetix Web Vulnerability Scanner 6.5
Web applications are accessible 24 hours a day, 7 days a week and control valuable data since they often have direct access to backend data such as customer databases. SSL and …
Secure USB flash drives: Do you need one?
How many times have you used a USB flash drive at your offices? Hundreds? Thousands? Their sheer convenience makes usage almost second nature. But as often happens with IT …
Q&A: Malware threats, Windows 7 and cyber crime
Bo Olsen is a malware Researcher at Kaspersky Lab Americas. In this interview he discusses new malware threats, the problems the anti-malware industry faces today, Windows 7 …
Understanding the risks of cloud computing: Questions to ask your service provider
Cloud computing has changed the audit and risk profile of data systems in most organizations. Whilst the economics of going down the cloud route for data storage are highly …
DHS has a vision for stronger information security
It was not all corporate talk at the RSA Conference Europe 2009 this week in London. Attending one of the roundtables was Philip Reitinger, U.S. Department of Homeland …
Q&A: Security challenges in today’s economy
Dave Hansen is the Corporate Senior Vice President and General Manager, CA Security Management. In this interview, he discusses how the underground economy is impacting large …
Cloud computing is changing the enterprise landscape
At the RSA Conference Europe 2009, Qualys CEO Philippe Courtot gave an overview about how cloud computing is changing the enterprise security landscape. Mr. Courtot …
Featured news
Resources
Don't miss
- ClickFix campaign delivers Mac malware via fake Apple page
- Poisoned “Office 365” search results lead to stolen paychecks
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)