Expert analysis
Who Goes to Jail?
The CIO has been living with the apparently unstoppable demand for more storage for quite a while, really since the Internet/ World Wide Web introduced a whole new concept of …
To Catch A Virus
Alfred Hitchcock, that great magician of the big screen, often said that to maintain suspense, the audience needed to know more about the situation than the characters in the …
Video Interview with Gerhard Eschelbeck, CTO of Qualys
In this video Mr. Eschelbeck discusses computer security at the enterprise level, inside and outside threats, computer security trends in the USA and Europe, and more.
Defending The Network
The World Wide Web is lauded for its ability to deliver instant communications and connectivity. However, the web’s speed and convenience brings with it the threat of …
E-mail Security
In this 6:49 minutes long audio learning session, Joseph Zacharias, Managing Director at Kerio Technologies UK, discusses the major aspects of e-mail security, including viral …
OpenVPN 101: introduction to OpenVPN
This document will introduce OpenVPN as a free, secure and easy to use and configure SSLbased VPN solution. The document will present some simple (and verified) …
A Practical Implementation of a Real-time Intrusion Prevention System for Commercial Enterprise Databases
Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural …
Executive Conversation: Attacking the Phishing Threat – What Every Company Needs to Know
By now just about every person with an email inbox has been exposed to a phishing scam. Spoofs are showing up with alarming frequency and to make matters worse, criminals have …
Secure Your Workplace When Going On Vacation
In the northern hemisphere, the long-awaited summer holidays are just around the corner for many workers. The longer days and warmer weather will see many people taking a …
Collaboration in a Secure Development Process, Part 1
You have to ask yourself: why is there so much bad code? How many times have you heard the statement to the effect of: “if only the developers had built these …
VPNs (Virtual Private Nightmares)
Here’s a question: What’s the number 1 vector for security outbreaks today? Given the title of the article we hope you answered Virtual Private Networks (VPNs). …
Five Tips on Protecting Your Business Against Spam
In this 4:29 minutes long audio learning session, Warren Sealey, SME Security Manager at Message Labs, discusses the ever growing spam problem, talks about the positive …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity