Please turn on your JavaScript for this page to function normally.
Cyber Attacks: A Real Threat For Every Organization

It is easy to fall into the extremes of either believing that targeted cyber attacks rarely happen, or that it happens to you or your company all the time. The truth is that …

Microsoft Chief Security Advisor Discusses Security Challenges and Windows Vista

Last week in London at the Infosecurity press conference, Ed Gibson, the Chief Security Advisor at Microsoft, shared his views on the security challenges the Redmond giant is …

Interview with Mads Lillelund, CEO of Bluesocket

Mads Lillelund is the CEO of Bluesocket, the leader in open wireless security and management solutions that simplify the complexities of mobile enterprises. In this interview …

Computer Security in 2007: A Report From The Infosecurity Europe Press Conference

With an announced 300 exhibitors (90 out of the UK), Infosecurity 2007 is definitely the largest gathering of principal vendors in Europe. Launched as a UK event in 1996, this …

Ajax Fingerprinting for Web 2.0 Applications

Fingerprinting is an age old concept and one that adds great value to assessment methodologies. There are several tools available for fingerprinting operating systems (nmap), …

Log Management – Lifeblood of Information Security

The responsibility to protect sensitive private information is now legally mandated and has become a key focus for many regulations within multiple industries. Information …

RFID in the Supply Chain – A New Demand for Availability

Knowing where items are in your supply chain is crucial to maintaining an efficient manufacturing process, and anything that can improve and automate this process is always …

Crawling Ajax-driven Web 2.0 Applications

Crawling web applications is one of the key phases of automated web application scanning. The objective of crawling is to collect all possible resources from the server in …

Interview with Balazs Fejes, CTO of EPAM Systems

Balazs Fejes joined EPAM Systems in 2004, when Fathom Technology merged with EPAM Systems. Prior to co-founding Fathom Technology Mr. Fejes was a chief software architect/line …

Creating A Culture Of Security – The Real Challenge

Why is business still plagued by poor data security? Why do we constantly read stories about security breaches, data theft and customer lawsuits stemming from confidential …

Automated Scanning vs. The OWASP Top Ten

The OWASP Top Ten is a list of the most critical web application security flaws – a list also often used as a minimum standard for web application vulnerability …

The Mighty Sniffer

One of the most important tools in a security professional’s arsenal is the mighty ‘sniffer’. Its power is never underestimated, never undervalued. A sniffer …

Don't miss

Cybersecurity news