Please turn on your JavaScript for this page to function normally.
Video Interview with Johan Custers, Director of European Operations at Funk Software

In this video Mr. Custers discusses the biggest security issues affecting wireless networks today, various methods for securing public wireless networks, he offers tips for …

SSL VPNs – You Can’t Afford to Ignore Them

Amidst the cacophony about VPNs and whether IPsec or SSL is the better solution, and which vendor has done the most to satisfy the journalists and analysts, one …

Wi-Fi Alliance Announces a List of WPA Certified Products

The Wi-Fi Alliance announced that over 175 wireless products from more than 40 leading manufacturers received the long awaited Wi-Fi Protected Access (WPA) security …

Video Interview with Douglas Dormer, President of Black Dragon Software

In this video Mr. Dormer discusses Black Dragon Software in general, proVizor – a security solution that provides a standard way to mathematically measure the strength …

11 Elements of a Successful Managed Security Partnership

More and more organizations are turning to Managed Security Services (MSS) to help them achieve their security objectives. Security teams need to do more to protect their …

Secure Web Based Mail Services

What do field sales people, home teleworkers, medical personnel, and any one working remotely from a central site have in common? A need for up to the minute information. One …

An Introduction To SQL Injection Attacks For Oracle Developers

Most application developers underestimate the risk of SQL injection attacks against web applications that use Oracle as the back-end database. This paper is intended for …

Spam Might Be Your Biggest Headache, But It’s Not Your Biggest Threat

In the last few years spam has grown exponentially. Despite changes in the law and the introduction of new regulations, junk email continues to flood in, overloading corporate …

An IT Manager’s Insight into Mobile Security

Mobile security is a hot issue, but who is listening? Who really cares? The mere word of security sends most people running. Investing in preventative IT security has never …

Oracle Database Listener Security Guide

Through our security consultations, we have consistently identified poor Oracle Database Listener (TNS Listener) security as a significant security risk. Few Oracle database …

The Biometrics Myth

First, the good news There are obvious attractions associated with biometric authentication systems. Apart from “looking the part’, users love them. Once enrolled, …

The Corporate Identity Crisis

A recent Cabinet Office report estimates that identity theft costs the U.K. economy more than £1.3 billion per year. This figure seems conservative next to a U.S. Federal …

Don't miss

Cybersecurity news