Expert analysis
Richard Rushing, AirDefense CSO, on Wireless Security
At the recent RSA Conference 2007 in San Francisco, AirDefense was doing wireless airwave monitoring. AirDefense found more than half of the 347 wireless devices susceptible …
HNS Podcast: Data Auditing
As founder and Chief Technical Officer, Prat Moghe drives the product vision, technology and market strategy at Tizor Systems. In this podcast, he talks about data auditing. …
Interview with Kurt Sauer, CSO of Skype
As Chief Security Officer at Skype Technologies, Kurt Sauer is focused on delivering trusted communications services via Skype’s platforms. Both the software delivered …
Jay Bavisi, President of EC-Council, on Ethical Hacking
We met with Jay Bavisi, President of EC-Council, at the RSA Conference 2007 in San Francisco. In this 07:20 video he talks about ethical hackers, the importance of …
HNS Podcast: Minimize Threats to Your Organization, Data and Networks
Andrew White is the Founder, President and Chief Executive Officer of Route1, a provider of security and identity management network solutions. Since enterprises are always …
Scanning Ajax for XSS Entry Points
The continuous adoption of Web 2.0 architecture for web applications is instrumental in Ajax, Web services and Flash, emerging as key components. Ajax is a combination of …
Cyber Attacks: A Real Threat For Every Organization
It is easy to fall into the extremes of either believing that targeted cyber attacks rarely happen, or that it happens to you or your company all the time. The truth is that …
Microsoft Chief Security Advisor Discusses Security Challenges and Windows Vista
Last week in London at the Infosecurity press conference, Ed Gibson, the Chief Security Advisor at Microsoft, shared his views on the security challenges the Redmond giant is …
Interview with Mads Lillelund, CEO of Bluesocket
Mads Lillelund is the CEO of Bluesocket, the leader in open wireless security and management solutions that simplify the complexities of mobile enterprises. In this interview …
Computer Security in 2007: A Report From The Infosecurity Europe Press Conference
With an announced 300 exhibitors (90 out of the UK), Infosecurity 2007 is definitely the largest gathering of principal vendors in Europe. Launched as a UK event in 1996, this …
Ajax Fingerprinting for Web 2.0 Applications
Fingerprinting is an age old concept and one that adds great value to assessment methodologies. There are several tools available for fingerprinting operating systems (nmap), …
Log Management – Lifeblood of Information Security
The responsibility to protect sensitive private information is now legally mandated and has become a key focus for many regulations within multiple industries. Information …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month