Expert analysis
Guard Against Cyberspace Threats
With the changing nature of threats in cyberspace, the need is growing to absorb attacks and to protect online identities against both high-profile and stealthy infiltration …
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Web-based applications and services have changed the landscape of information delivery and exchange in today’s corporate, government, and educational arenas. Ease of …
Change and Configuration Solutions Aid PCI Auditors
To the casual observer of the Payment Card Industry (PCI) standard, it might seem that the standard deals exclusively with the servers and point-of-sale terminals that house …
Network Access Control: Bridging the Network Security Gap
The business work place has evolved significantly over the last ten years. Back then, networks were far more simplistic; the internet was not a critical business tool, there …
Securing Moving Targets
Newton’s first law of motion states that a moving body will want to keep moving. The same law also seems to apply to business data, and the problem is trying to stop …
Interview with Gregory Conti, Assistant Professor of Computer Science at the United States Military Academy
Besides his work as a professor and Director of the Information and Technology and Operations research center, Gregory Conti is also the author of the excellent book Security …
The Future of Encryption
In today’s world the protection of sensitive data is one of the most critical concerns for organizations and their customers. This, coupled with growing regulatory …
The Need for a New Security Approach
Historically the goal of security for most companies was nice and simple: keep the bad guys out. And it was easy to classify who the bad guys were. The bad guys were everyone …
Where’s My iPhone? A Lesson in Incident Response
Security incidents come in many forms, from attackers breaking into computers, unauthorized attempts to sniff wireless networks and collect information, and stolen laptops or …
Interview with Nitesh Dhanjani and Billy Rios, Spies in the Phishing Underground
Both Nitesh and Billy are well-known security researchers that have recently managed to infiltrate the phishing underground. What started as a simple examination of phishing …
Social Engineering: Threats and Countermeasures
Over the years much has been written about how users are the weakest link in security, and there are surely not many people who would disagree. Despite this, companies often …
Web 2.0 Security
Web 2.0 is an umbrella term coined to include technologies used for providing user-centric web based services. Here, the services are architected and programmed so that they …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month