Expert analysis
Q&A: Penetration testing
Thomas Wilhelm is an associate professor at Colorado Technical University and also employed at a Fortune 20 company performing penetration testing and risk assessments and has …
Internet vault with built-in data inheritance
DataInherit, a new online data storage service with built-in data inheritance has been offered by DSwiss AG, a Swiss bank for information assets owned partly by Avantec. …
Q&A: OSSEC, the open source host-based intrusion detection system
Daniel B. Cid is the founder of the open source OSSEC HIDS and a principal researcher at Trend Micro. He has a special interest in intrusion detection, log analysis and secure …
10 software apps for encryption for the Mac
In this day and age, nobody can afford NOT to use encryption, and the sooner we all get used to using it on a daily basis, the better. We live in a world where secrets are …
Q&A: Vulnerability management
Eric Perraudeau is the product manager for QualysGuard vulnerability management (VM) solutions. Prior to Qualys, Eric was a security engineer at Accor and Morse in France. In …
Q&A: Windows forensics
Harlan Carvey, CISSP, is a computer security engineer and book author. He has conducted penetration tests and vulnerability assessments in support of corporate and federal …
A closer look at Elcomsoft Advanced Office Password Breaker 3 Enterprise Edition
Elcomsoft Advanced Office Password Breaker breaks passwords and unlocks password-protected MS Word documents and Excel spreadsheets instead of attacking and recovering complex …
Firewire-based physical security attacks on Windows 7, EFS and BitLocker
This paper discusses Firewire-based physical security attacks on Microsoft Windows 7. In the course of his research, the author was successfully able to bypass the Windows 7 …
Securing virtualized environments
IT departments are under immense pressure to deliver more functionality and capacity at a time when budgets are shrinking and costs are increasing. Mounting expenses from …
Malware beyond Vista and XP
Windows may be ubiquitous, but there’s a thriving variety of alternative operating systems for enterprise and home use. However, the alternatives aren’t as risk …
Q&A: Dasient and current threats
Ameet Ranadive is a co-founder of Dasient, an Internet security company that protects websites from web-based malware attacks. In this interview he introduces his team at …
Security considerations for ISPs complying with the European Union Data Retention Directive
Back in April of this year the UK Home Office announced that all ISPs must retain their internet-related communication data for law enforcement authorities (LEAs) to gain …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)