Please turn on your JavaScript for this page to function normally.
Security threats: A guide for small and medium businesses

A successful business works on the basis of revenue growth and loss prevention. Small and medium-sized businesses are particularly hit hard when either one or both of these …

The economy and cyber crime

In this uncertain global economy, you can count on one thing: crime – both in the real world and the online one – has the opportunity to thrive. According to a …

Banning wireless doesn’t stop users

Wireless LANs (WLANs) are increasingly becoming a commodity in the home, in the high street, at the airport – everywhere but in the office it seems. This is because it …

What to do about social networking in your company

The growing popularity of social networking sites such as Facebook is slowly developing into a massive headache for IT administrators as employees spend time updating their …

Q&A: Malware Trends

Marc Fossi manages research and development for Symantec Security Response where his primary role is executive editor of the Symantec Internet Security Threat Report. The …

Secure start-up for POS

Secure start-up of encryption services in a typical retail POS configuration can be provided by implementing the following (very general) best practices. Each Local Security …

Keeping Virtual Security Real

Remember the first time you drove a car on your own, and you’d get a kick from the sensation of sheer speed? Unfortunately, you also have to learn the mundane stuff like …

Q&A: Government Security and Mobile Devices

Joseph Hagin is the Former Deputy White House Chief of Staff. In that role he had a high-level of concern about hacking and other security concerns related to …

Towards Kerberizing Web Identity and Services

Today authentication and authorization are addressed in an incoherent, and often site-specific, fashion on the Internet and the Web specifically. This situation stems from …

Applied Binary Code Obfuscation

An obfuscated code is the one that is hard (but not impossible) to read and understand. Sometimes corporate developers, programmers and malware coders for security reasons, …

Q&A: RSA Conference 2009

Sandra Toms LaPedis, Area Vice President and General Manager of RSA Conferences, is responsible for global promotion and successful execution, including strategy, brand …

What the Heartland Data Breach Tells Us

The recent data breach at Heartland Payment Systems should make one thing clear: the standards for security around credit card numbers still aren’t good enough. New …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools