Expert analysis
7 tips for basic e-mail security
Simple to implement, these tips can be a good start to making sure your e-mail communication becomes more secure. 1. Understand that no e-mail communication is 100% secure. We …
The threat within: Protecting information assets from well-meaning employees
Most information security experts will agree that employees form the weakest link when it comes to corporate information security. Malicious insiders aside, well-intentioned …
Q&A: PCI compliance
Jim Bibles is a Product Manager at Qualys currently directing the development and enhancement of the company’s QualysGuard PCI solution. His security background ranges …
A closer look at Kaspersky Internet Security 2010
Kaspersky Internet Security is security software that offers protection against viruses, spyware, spam, identity theft and phishing. It also has parental and privacy controls. …
Q&A: Penetration testing
Thomas Wilhelm is an associate professor at Colorado Technical University and also employed at a Fortune 20 company performing penetration testing and risk assessments and has …
Internet vault with built-in data inheritance
DataInherit, a new online data storage service with built-in data inheritance has been offered by DSwiss AG, a Swiss bank for information assets owned partly by Avantec. …
Q&A: OSSEC, the open source host-based intrusion detection system
Daniel B. Cid is the founder of the open source OSSEC HIDS and a principal researcher at Trend Micro. He has a special interest in intrusion detection, log analysis and secure …
10 software apps for encryption for the Mac
In this day and age, nobody can afford NOT to use encryption, and the sooner we all get used to using it on a daily basis, the better. We live in a world where secrets are …
Q&A: Vulnerability management
Eric Perraudeau is the product manager for QualysGuard vulnerability management (VM) solutions. Prior to Qualys, Eric was a security engineer at Accor and Morse in France. In …
Q&A: Windows forensics
Harlan Carvey, CISSP, is a computer security engineer and book author. He has conducted penetration tests and vulnerability assessments in support of corporate and federal …
A closer look at Elcomsoft Advanced Office Password Breaker 3 Enterprise Edition
Elcomsoft Advanced Office Password Breaker breaks passwords and unlocks password-protected MS Word documents and Excel spreadsheets instead of attacking and recovering complex …
Firewire-based physical security attacks on Windows 7, EFS and BitLocker
This paper discusses Firewire-based physical security attacks on Microsoft Windows 7. In the course of his research, the author was successfully able to bypass the Windows 7 …
Featured news
Resources
Don't miss
- Agentic AI security: Building the next generation of access controls
- When everything’s connected, everything’s at risk
- AI’s split personality: Solving crimes while helping conceal them
- 10 data security companies to watch in 2026
- Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)