Expert analysis
Security Trends of 2008 and Predictions for 2009
As a new year approaches we must prepare for new Internet security threats. Every year, new and innovative ways of attacking computer users emerge and continue to increase in …
The Rise and Rise of Rogue Security Software
Rogue security software is an application that appears to be beneficial from a security perspective but provides little or no security, generates erroneous alerts, or attempts …
What To Do About Social Networking In Your Company
The growing popularity of social networking sites such as Facebook, Bebo and MySpace is slowly developing into a massive headache for IT administrators as employees spend time …
Protecting Corporate Brands: One Keystroke at a Time
Enterprises spend a great deal of time and money building up their brand identity, and for good reason. It’s not only a primary component to an organization’s …
Safe Computing During The Holiday Season
The holiday season is a time of increased online activity. During the hustle and bustle that surrounds this time of year, what’s more convenient than saving a little …
Attacks On Banks
This article provides an overview of the methods currently used by cyber criminals to attack financial institutions and banks in particular. It reviews general trends and …
Trust No One
It’s easy to say what we’re all securing our systems and data against. But isn’t easy to say exactly who we need to secure against, nor who presents the …
Lavasoft and the antispyware industry
In this video, Lavasoft CEO Jason King offers a brief history of Lavasoft and its role in the antispyware industry, the growth of the company, the shift in the marketplace as …
Q&A: Software Piracy
Jan Samzelius is the CEO and one of the founders of ByteShield, a company whose mission is protecting PC software applications and games against illegal copying. Let’s …
PCI Sample Encryption Key Management Documentation
In the four years since merchants were required to comply with the Payment Card Industry Data Security Standards (PCI-DSS), CTG has found many clients still struggling with …
Q&A: Mobile Forensics
Aviad Ofrat is the CEO of Cellebrite and in this interview discusses mobile forensics as well as the Universal Forensic Extraction Device. In your opinion, how important is a …
Building C-Level Confidence with a Security Blueprint
IT professionals wear many hats these days. Not only are they charged with keeping the lights on, they must establish and maintain a defined security posture, ensure …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime