Expert analysis
SIEM: the Answer to Awkward Security Questions
What’s the one security question that you don’t want to be asked about your company? I believe it’s the same question that Her Majesty the Queen raised when …
Security Trends of 2008 and Predictions for 2009
As a new year approaches we must prepare for new Internet security threats. Every year, new and innovative ways of attacking computer users emerge and continue to increase in …
The Rise and Rise of Rogue Security Software
Rogue security software is an application that appears to be beneficial from a security perspective but provides little or no security, generates erroneous alerts, or attempts …
What To Do About Social Networking In Your Company
The growing popularity of social networking sites such as Facebook, Bebo and MySpace is slowly developing into a massive headache for IT administrators as employees spend time …
Protecting Corporate Brands: One Keystroke at a Time
Enterprises spend a great deal of time and money building up their brand identity, and for good reason. It’s not only a primary component to an organization’s …
Safe Computing During The Holiday Season
The holiday season is a time of increased online activity. During the hustle and bustle that surrounds this time of year, what’s more convenient than saving a little …
Attacks On Banks
This article provides an overview of the methods currently used by cyber criminals to attack financial institutions and banks in particular. It reviews general trends and …
Trust No One
It’s easy to say what we’re all securing our systems and data against. But isn’t easy to say exactly who we need to secure against, nor who presents the …
Lavasoft and the antispyware industry
In this video, Lavasoft CEO Jason King offers a brief history of Lavasoft and its role in the antispyware industry, the growth of the company, the shift in the marketplace as …
Q&A: Software Piracy
Jan Samzelius is the CEO and one of the founders of ByteShield, a company whose mission is protecting PC software applications and games against illegal copying. Let’s …
PCI Sample Encryption Key Management Documentation
In the four years since merchants were required to comply with the Payment Card Industry Data Security Standards (PCI-DSS), CTG has found many clients still struggling with …
Q&A: Mobile Forensics
Aviad Ofrat is the CEO of Cellebrite and in this interview discusses mobile forensics as well as the Universal Forensic Extraction Device. In your opinion, how important is a …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security