Expert analysis
Biometrics: What and How
Humans use body characteristics to recognize each other. Some characteristics don’t change over time and some do. What characteristics do we use for identifying people? …
RSS Security Threats With Financial Services
Web 2.0 technologies are penetrating deeper into the financial services sector as Enterprise 2.0 solutions, adding value to financial services. Analysts can leverage …
Practical Tips for Safer Computing
David Perry, the Global Director of Education at Trend Micro, discusses the Malware Report for 2007 and offers a variety of practical tips for safer computing that will …
Modifications for Stopping phpBB Forum Spambots
phpBB is one of the most popular software products for running online forums. As spammers found forums as a fantastic breeding ground for sending their commercial messages, …
Top 10 WordPress Anti Spam Plugins
Blog spam is a huge problem but fortunately protection is available and in a few steps you can make sure you are protected. Check out the plugins below, one of them will …
Richard Rushing, AirDefense CSO, on Wireless Security
At the recent RSA Conference 2007 in San Francisco, AirDefense was doing wireless airwave monitoring. AirDefense found more than half of the 347 wireless devices susceptible …
HNS Podcast: Data Auditing
As founder and Chief Technical Officer, Prat Moghe drives the product vision, technology and market strategy at Tizor Systems. In this podcast, he talks about data auditing. …
Interview with Kurt Sauer, CSO of Skype
As Chief Security Officer at Skype Technologies, Kurt Sauer is focused on delivering trusted communications services via Skype’s platforms. Both the software delivered …
Jay Bavisi, President of EC-Council, on Ethical Hacking
We met with Jay Bavisi, President of EC-Council, at the RSA Conference 2007 in San Francisco. In this 07:20 video he talks about ethical hackers, the importance of …
HNS Podcast: Minimize Threats to Your Organization, Data and Networks
Andrew White is the Founder, President and Chief Executive Officer of Route1, a provider of security and identity management network solutions. Since enterprises are always …
Scanning Ajax for XSS Entry Points
The continuous adoption of Web 2.0 architecture for web applications is instrumental in Ajax, Web services and Flash, emerging as key components. Ajax is a combination of …
Cyber Attacks: A Real Threat For Every Organization
It is easy to fall into the extremes of either believing that targeted cyber attacks rarely happen, or that it happens to you or your company all the time. The truth is that …
Featured news
Resources
Don't miss
- Product showcase: Ledger Flex secure crypto wallet
- Villain: Open-source framework for managing and enhancing reverse shells
- Securing the invisible: Supply chain security trends
- Why cyber resilience must be part of every organization’s DNA
- 44% of the zero-days exploited in 2024 were in enterprise solutions