Expert analysis
Application Denial of Service (DoS) Attacks
Denial of Services attacks aimed at disrupting network services range from simple bandwidth exhaustion attacks and those targeted at flaws in commercial software to complex …
Alternatives to Passwords
The third annual survey into office scruples conducted by Infosecurity Europe 2004 found that office workers are still not information security savvy. A survey of office …
Executive Conversation: Why Cloudmark Took the Path Less Traveled
Spam, spim, spoofs-¦will it ever end? Cloudmark believes that spam and all of its incarnations will indeed disappear through a combination of carefully harvested human …
Best Practices for Storage Security
IT professionals and their businesses have learned the hard way in recent years that disaster can strike at anytime and that they must be prepared. Companies unable to resume …
Secure Development: A Polarised Response
Thankfully these days’ assessing the security of an application prior to implementation is a normal process for most organisations. Organisations accept the view that …
Report from the Juniper Networks/NetScreen EMEA Press Summit
At the second Juniper Networks/NetScreen EMEA Press Summit that was held between May 26th and 28th in Marbella, Spain, the company managed to take us on an interesting …
How Much Should You Invest in IT Security?
One of the main concerns of the organizers of the Olympic Games to be held in Athens this summer is security, but not only physical security, computer security as well. The …
Early Alerting – The Key To Proactive Security
The security challenges facing today’s enterprise networks are intensifying — both in frequency and number. The Blaster worm arrived just 26 days after Microsoft …
Key Considerations for Outsourcing Security
Introduction As last summer’s virus attacks vividly demonstrated, companies of every size are finding themselves hard pressed to maintain around-the-clock network …
Automated Penetration Testing with CORE IMPACT 4.0
Core Security Technologies today announced a major update to CORE IMPACT, their flagship penetration testing product. The major benefit of this solution is that it enables …
Security in an ERP World
Introduction Every good hacker story ends with the line: “and then he’s got root access to your network and can do whatever he wants.” But the story really …
Audio interview with Brian Cohen, SPI Dynamics CEO
In this ten minute audio interview, Brian Cohen, SPI Dynamics Chief Executive Officer introduces his company, discusses the current state and future of the web application …
Featured news
Resources
Don't miss
- Threat actors are using legitimate Microsoft feature to compromise M365 accounts
- North Korean hackers spotted using ClickFix tactic to deliver malware
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance