Expert analysis
Business Model for Information Security
During the Infosecurity Europe 2009 conference in London, we talked with Ron Hale, Director of Information Security Practices at ISACA. ISACA is a well known worldwide …
Q&A: Security threats to financial organizations
Ori Eisen is the founder and Chief Innovation Officer of 41st Parameter. In this interview he discusses the security threats to financial organizations and their customers, …
SSH Solutions with CEO George Adams
George Adams, the President and CEO of SSH Communications Security, discusses their solutions for securing and managing data in enterprise networks. This includes the new SSH …
A closer look at Avira AntiVir Personal Free Antivirus 9
Avira AntiVir Personal Free Antivirus is a comprehensive, easy to use antivirus program for home-users only. It offers malware recognition of viruses, Trojans, backdoor …
Waging war on cyber threats
The Obama Administration did what many in the political and national security arenas have been advocating for some time – make Cybersecurity its own Department of …
Q&A: Analyzing the security, compliance and cost benefits of tokenization
Tokenization has been billed as the magic data security bullet for retailers, offering strong protection for stored sensitive data and an attractive cost-saving strategy for …
The role of encryption in database security
For many organizations, databases are a treasure trove of sensitive information containing data ranging from customers’ personal details and confidential competitive …
Securing Web 2.0: Writing’s on the wall
Love or loathe it, businesses can’t ignore the Web 2.0 phenomenon. As LinkedIn, Facebook, Twitter, wikis, blog sites, Flickr, music sharing and other collaborative …
Q&A: The critical infrastructure and digital security
Brian M. Ahern is president and CEO of Industrial Defender, the world’s fastest growing SCADA security company. In this interview, he discusses the security of critical …
A closer look at Folder Lock 6.2.1
Folder Lock is a Windows tool that enables you to create a password protected folder. The folder is completely hidden while it is locked, and the files, folders and drives …
Is your firewall a fire hazard?
Ask a firewall administrator to tidy up a rule base and get rid of every unused rule and object; or if you really want to make someone’s life miserable set them the task …
A closer look at Cryptainer PE 7.1
Cryptainer PE creates a secure container on your PC, using strong encryption. It creates new virtual drive letter(s), and all files that are added to this drive are encrypted …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)