Expert analysis
Log Management – Lifeblood of Information Security
The responsibility to protect sensitive private information is now legally mandated and has become a key focus for many regulations within multiple industries. Information …
RFID in the Supply Chain – A New Demand for Availability
Knowing where items are in your supply chain is crucial to maintaining an efficient manufacturing process, and anything that can improve and automate this process is always …
Crawling Ajax-driven Web 2.0 Applications
Crawling web applications is one of the key phases of automated web application scanning. The objective of crawling is to collect all possible resources from the server in …
Interview with Balazs Fejes, CTO of EPAM Systems
Balazs Fejes joined EPAM Systems in 2004, when Fathom Technology merged with EPAM Systems. Prior to co-founding Fathom Technology Mr. Fejes was a chief software architect/line …
Creating A Culture Of Security – The Real Challenge
Why is business still plagued by poor data security? Why do we constantly read stories about security breaches, data theft and customer lawsuits stemming from confidential …
Automated Scanning vs. The OWASP Top Ten
The OWASP Top Ten is a list of the most critical web application security flaws – a list also often used as a minimum standard for web application vulnerability …
The Mighty Sniffer
One of the most important tools in a security professional’s arsenal is the mighty ‘sniffer’. Its power is never underestimated, never undervalued. A sniffer …
Q&A with Amichai Shulman on the Critical Vulnerability in AJAX Technology
Recently, the Imperva Application Defense Center announced the discovery of a critical vulnerability in DWR (Direct Web Reporting), a key underlying technology in the AJAX web …
Risk Mitigation for Legacy Windows NT 4.0 Systems
Arguably one of today’s biggest risks for network security and compliance are lingering systems that are no longer supported by their vendors. The security flaws in …
Where’s the ROI on Security Hardware?
Every organization sees security as an area where you can never have too much, but the cost of securing the network is effectively money lost. Security comes at a price, but …
Botox And IT Security – Is It Too Late For You?
As a fifty something male, personal grooming takes on whole new meaning. You realize that when you start typing “Botox” on Google that things are getting serious. …
PCI Data Security Standard Calls for Next-Generation Network Security
The widespread use of credit cards for virtually all of our financial transactions has increased exponentially with the rapid adoption of e-commerce throughout the worldwide …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains