Expert analysis
Best Practices For Securing Your WLAN
The steady growth of Wi-Fi in the enterprise demands that corporate IT teams learn and adopt new security methodologies tailored to the unique requirements and weaknesses of …
Encryption Applied
In this 8:13 minutes long audio learning session, Alex van Someren, Chief Executive Officer at nCipher, talks about the process of encryption, the difference between symmetric …
Biometric Myths: Six Of The Best
It is probably the hottest sector in the security field today. Yet the biometrics industry, which produces human-based identification systems, is weighed down with claims and …
Interview with Bruce Hendrix, President and CEO of ServGate
What do you see as the biggest online security threats today? What are your clients most worried about? The key threats to deal with today are the so-called ‘blended …
Digital Certificates Explained
In this 3:43 minutes long audio learning session, Dr. Phillip Hallam-Baker, Principle Scientist and Web Services Security Architect at Verisign, talks about Public Key …
Are You Prepared For Disaster? Is Your Data Really Protected?
Whether it be hurricane, flood, fire or simply a member of staff accidentally hitting the delete key, your company’s data is constantly at risk from being permanently …
Executive Conversation: The Future of Instant Messaging is Simple, Secure, and Self-Managed
For a moment let’s suppose I am the CEO of a multi-million dollar corporation and I send an Instant Message to my General Counsel. He sends me information that should …
A Holistic Approach to Securing the Enterprise
The continuance of malicious computer attacks has made security a front page topic in almost every board room and IT oversight committee. Most IT departments accept that …
SQL Injection Attacks
SQL injection is a technique for exploiting web applications that use client-supplied data in SQL queries without stripping potentially harmful characters first. Despite being …
Cookie Path Best Practice
Cookies provide a method for creating a stateful HTTP session and their recommended use is formally defined within RFC2965 and BCP44. Although they are used for many purposes, …
The Benefits of SSL VPNs
Secure Sockets Layer (SSL) Virtual Private Networks are quickly gaining popularity as serious contenders in the remote-access marketplace. Analysts predict that products based …
Secure Development Framework
This whitepaper deals with developing a secure framework, both for internal and outsourced development. Within this context, secure development is considered to be the process …
Featured news
Resources
Don't miss
- The XCSSET info-stealing malware is back, targeting macOS users and devs
- A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
- Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme
- How CISOs can balance security and business agility in the cloud
- Orbit: Open-source Nuclei security scanning and automation platform