Expert analysis
Wi-Fi Alliance Announces a List of WPA Certified Products
The Wi-Fi Alliance announced that over 175 wireless products from more than 40 leading manufacturers received the long awaited Wi-Fi Protected Access (WPA) security …
Video Interview with Douglas Dormer, President of Black Dragon Software
In this video Mr. Dormer discusses Black Dragon Software in general, proVizor – a security solution that provides a standard way to mathematically measure the strength …
11 Elements of a Successful Managed Security Partnership
More and more organizations are turning to Managed Security Services (MSS) to help them achieve their security objectives. Security teams need to do more to protect their …
Secure Web Based Mail Services
What do field sales people, home teleworkers, medical personnel, and any one working remotely from a central site have in common? A need for up to the minute information. One …
An Introduction To SQL Injection Attacks For Oracle Developers
Most application developers underestimate the risk of SQL injection attacks against web applications that use Oracle as the back-end database. This paper is intended for …
Spam Might Be Your Biggest Headache, But It’s Not Your Biggest Threat
In the last few years spam has grown exponentially. Despite changes in the law and the introduction of new regulations, junk email continues to flood in, overloading corporate …
An IT Manager’s Insight into Mobile Security
Mobile security is a hot issue, but who is listening? Who really cares? The mere word of security sends most people running. Investing in preventative IT security has never …
Oracle Database Listener Security Guide
Through our security consultations, we have consistently identified poor Oracle Database Listener (TNS Listener) security as a significant security risk. Few Oracle database …
The Biometrics Myth
First, the good news There are obvious attractions associated with biometric authentication systems. Apart from “looking the part’, users love them. Once enrolled, …
The Corporate Identity Crisis
A recent Cabinet Office report estimates that identity theft costs the U.K. economy more than £1.3 billion per year. This figure seems conservative next to a U.S. Federal …
FreeBSD 5.2 is here
Building upon the success of FreeBSD 5.1, this release includes: Full Tier-1 support for single and multiprocessor AMD Athlon64 and Opteron systems. Dynamically linked root …
Improving Passive Packet Capture: Beyond Device Polling
Passive packet capture is necessary for many activities including network debugging and monitoring. With the advent of fast gigabit networks, packet capture is becoming a …
Featured news
Sponsored
Don't miss
- How to make Infrastructure as Code secure by default
- Suspect arrested over the Transport for London cyberattack
- Adobe completes fix for Reader bug with known PoC exploit (CVE-2024-41869)
- Losses due to cryptocurrency and BEC scams are soaring
- Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense