Expert analysis
European information security leaders gather in Greece
After a successful event in 2008, beautiful Aldemar Knossos Royale Village resort on the island of Crete is once again hosting a group of experts in Information security, …
Cross Widget DOM access: Spy on the page
Widgets, Gadgets or Modules are very common and powerful feature of Web 2.0 applications. They convert a single loaded page in the browser to multi-threaded application. They …
Web applications: Easy prey for hackers
Web applications are usually exposed on the Internet and offer an easier prey for attackers, who can develop tools that mimic legitimate users behavior in order to scan the …
Q&A: SQL injection
Justin Clarke is a co-founder and Director at Gotham Digital Science. He has over twelve years of experience in assessing the security of networks, web applications, and …
Vast malware repository dedicated to testing and research
Frame4 Group is a Dutch company that has made its name specializing in different fields within IT: project and change management, process engineering, test coordination and …
The path to comprehensive ID management
There have been many changes since enterprises first looked at implementing smart card-based common access card programs in the 1990s. Although some large corporations …
Q&A: Enterprise threats and compliance
John Viega is the CTO, Software-as-a-Service, at McAfee. John is author of many security books and is responsible for numerous software security tools and is the original …
A closer look at F-Secure Internet Security 2010
Following a redesign of their logo and their motto, F-Secure redesigned their Internet Security suite. F-Secure Internet Security 2010 is a security solution designed for …
7 tips for basic e-mail security
Simple to implement, these tips can be a good start to making sure your e-mail communication becomes more secure. 1. Understand that no e-mail communication is 100% secure. We …
The threat within: Protecting information assets from well-meaning employees
Most information security experts will agree that employees form the weakest link when it comes to corporate information security. Malicious insiders aside, well-intentioned …
Q&A: PCI compliance
Jim Bibles is a Product Manager at Qualys currently directing the development and enhancement of the company’s QualysGuard PCI solution. His security background ranges …
A closer look at Kaspersky Internet Security 2010
Kaspersky Internet Security is security software that offers protection against viruses, spyware, spam, identity theft and phishing. It also has parental and privacy controls. …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)