Expert analysis
VPN market choices: Aligning network planning to enterprises’ security and mobility requirements
Virtual Private Networks (VPNs) are an essential part of enterprises’ IT security policies. Unfortunately, with the variety of mobile device applications, empowering …
Safety in the cloud(s): ‘Vaporizing’ the Web application firewall to secure cloud computing
Cloud computing was not designed for security, although organizations such as Cloud Security Alliance (CSA) and Open Web Application Security Project (OWASP) are making great …
A closer look at Nero BackItUp & Burn
Nero BackItUp & Burn lets you back up files to your hard drive or to online storage, schedule automatic backups, burn music, videos, photos, and data to CDs, DVDs, and …
Memo to CIOs: Your next security crisis may have nothing to do with cyber attacks
I must admit I’m as much to blame here as anyone. After all, I’m the head of a company that prides itself on offering security appliances that will halt any …
Q&A: Privacy and anonymity with Tor
Andrew Lewman is executive director of The Tor Project, a non-profit organization providing research and free software that protects your online privacy and anonymity. He is a …
Q&A: Cain & Abel, the password recovery tool
Massimiliano Montoro is the mastermind behind Cain & Abel, the password recovery tool for Windows. In this interview he provides insight on the history of the tool, the …
A closer look at SpywareBlaster 4.2
SpywareBlaster prevents the installation of ActiveX-based spyware, adware, dialers, browser hijackers, and other potentially unwanted programs. It can also block …
A closer look at Little Snitch 2.1.4
Little Snitch is a Mac tool that protects private data from undesirable transmission. It informs you whenever a program attempts to establish an outgoing Internet connection. …
Q&A: The Kantara Initiative and the global identity landscape
Roger Sullivan serves as president of the Kantara Initiative Board of Trustees and president of the Liberty Alliance Management Board. He is vice president, Oracle Identity …
A closer look at Spybot – Search & Destroy 1.6.2
Spybot – Search & Destroy can detect and remove adware files and modules from your computer. Spybot also can clean program and Web-usage tracks from your system. …
The evolution of Qualys
Qualys CEO Philippe Courtot discusses the evolution of Qualys, from the early days to current projects and future ideas.
A closer look at MacScan 2.6.1
MacScan detects, isolates, and removes spyware applications such as keystroke loggers and trojan horses. Blacklisted cookie scanner removes tracking cookies without saved …
Featured news
Resources
Don't miss
- ClickFix campaign delivers Mac malware via fake Apple page
- Poisoned “Office 365” search results lead to stolen paychecks
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)