Please turn on your JavaScript for this page to function normally.
Security Extensions for Your Joomla! Installation

Joomla! is a free, open source Content Management System that allows you to build websites and other online applications. Because it’s easy to install and simple to …

On the Security of E-Passports

The global introduction of electronic passports is a large coordinated attempt to increase passport security. Issuing countries can use the technology to combat passport …

WordPress Security Plugins

WordPress is a powerful publishing platform that is easy to use and offers anyone the possibility to start a blog in no time. Because of its versatility and a large quantity …

The Case for Automated Log Management in Meeting HIPAA Compliance

The Impact of HIPAA The Health Insurance Portability Accountability Act, better known as HIPAA, was passed in 1996 by the US Department of Health and Human Standards (HHS) to …

Privacy: Erase Your Hard Drive

You may not be aware of this, but merely erasing your data the regular way does not make it disappear for good. Some of it can still be retrieved with the use of recovery …

Network Access Control (NAC)

The three cardinal questions for security compliance, which every network administrator and owner endeavour to answer are: How do I stop unauthorized users and endpoints from …

Security Plugins for Movable Type

Movable Type is a popular weblog publishing system that supports a variety of plugins. This article lists some very useful security-oriented plugins that can enhance your …

Safeguard Your Organization with Proper Password Management

Access control is one way to ensure security in your organization. An intruder can break into your network by compromising accounts with weak passwords. If the compromised …

Mac Security Freeware: Confidential Data Manager and Password Storage Utility

In a series of articles on Mac security freeware I will be covering a number of newly released security tools for Mac OS X. This time I am taking a look at two confidential …

A Multi Layered Approach to Prevent Data Leakage

Databases remain one of the least protected areas in the enterprise Skilled malicious hackers are no longer interested in getting millions of people to open up e-mailed …

Searching For a Cure to Web Malware

Nine out of ten new web sites visited are found through Internet searches. In fact, web search has become an essential part of doing business online with more than 80 per cent …

Interview with Michael Rash, Security Architect and Author of “Linux Firewalls”

Michael Rash is a security architect with Enterasys Networks, where he develops the Dragon intrusion and prevention system. He is a frequent contributor to open source …

Don't miss

Cybersecurity news