Expert analysis
Q&A: 1Password
Carl Slawinski is the Chief Evangelist for Agile Web Solutions, the company behind 1Password, a hugely popular Mac software title. In this interview he takes us down memory …
European information security leaders gather in Greece
After a successful event in 2008, beautiful Aldemar Knossos Royale Village resort on the island of Crete is once again hosting a group of experts in Information security, …
Cross Widget DOM access: Spy on the page
Widgets, Gadgets or Modules are very common and powerful feature of Web 2.0 applications. They convert a single loaded page in the browser to multi-threaded application. They …
Web applications: Easy prey for hackers
Web applications are usually exposed on the Internet and offer an easier prey for attackers, who can develop tools that mimic legitimate users behavior in order to scan the …
Q&A: SQL injection
Justin Clarke is a co-founder and Director at Gotham Digital Science. He has over twelve years of experience in assessing the security of networks, web applications, and …
Vast malware repository dedicated to testing and research
Frame4 Group is a Dutch company that has made its name specializing in different fields within IT: project and change management, process engineering, test coordination and …
The path to comprehensive ID management
There have been many changes since enterprises first looked at implementing smart card-based common access card programs in the 1990s. Although some large corporations …
Q&A: Enterprise threats and compliance
John Viega is the CTO, Software-as-a-Service, at McAfee. John is author of many security books and is responsible for numerous software security tools and is the original …
A closer look at F-Secure Internet Security 2010
Following a redesign of their logo and their motto, F-Secure redesigned their Internet Security suite. F-Secure Internet Security 2010 is a security solution designed for …
7 tips for basic e-mail security
Simple to implement, these tips can be a good start to making sure your e-mail communication becomes more secure. 1. Understand that no e-mail communication is 100% secure. We …
The threat within: Protecting information assets from well-meaning employees
Most information security experts will agree that employees form the weakest link when it comes to corporate information security. Malicious insiders aside, well-intentioned …
Q&A: PCI compliance
Jim Bibles is a Product Manager at Qualys currently directing the development and enhancement of the company’s QualysGuard PCI solution. His security background ranges …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month