Expert analysis
Interview with Ken Cutler, Vice President, Information Security, MIS Training Institute
What do you see as the biggest online security threats today? Today’s biggest online threats come from malicious software (e.g., viruses, worms, and ad-bots), phishing …
Password Management with PasswordSafe
Everyone is aware that selecting passwords wisely and safeguarding them should be an important priority, yet most people need to remember so many passwords that it’s …
Video interview with Howard Schmidt, CSO of eBay
In this video Mr. Schmidt talks about the state of computer security in general and offers his insight on what we can expect in 2005. Furthermore he discusses the problem of …
New Year Resolutions: Computer Security
It’s that time of the year again when we all reflect on the year gone by and consider what lies ahead. In the world of IT, most of us have been grateful onlookers when …
Security Risks In The Wireless Computing Environment
The wireless network as a computing paradigm has brought unprecedented access, flexibility and usability to the I.T. environment in a relatively short time. When one considers …
Data Security Summary of 2004
Mikko Hypponen, Director of Anti-Virus Research at F-Secure, presents HNS visitors with an overview of data security in 2004. The audio concentrates on viruses, worms, …
Why Your Data Is At Risk
Electronic data resides in two basic areas: In bulk in some form of repository, such as a database or collections of individual files (called data at rest) In small quantities …
Video interview with George P. Japak, Vice President of ICSA Labs
In this video Mr. Japak talks about the importance of product certification, the full disclosure of vulnerabilities, how ICSA Labs approaches product testing, how they …
Adaptive and Behavioral Approach to New Threats
A wake up call It was early morning on a typical business day when an intrusion detection system generated an alert of unusual TCP activity at a customer’s Boston branch …
Password Overload Syndrome – The Latest Disorder Ravaging The IT Industry
I’ve got password overload syndrome! When I went to see my doctor he quietly admitted it had got him too – as he fumbled to access my notes on-screen? The chap at …
Sarbanes-Oxley: An Opportunity for Security Professionals
Sarbanes-Oxley (SOX) is not just another regulation security professionals have to contend with in your already very busy lives. Instead, SOX should be viewed as opportunity …
Why “Identity” Is Central To IT Security
The increasing demand from our users to provide “Anywhere Access’ to our most sensitive business systems; allowing them to connect from any computing device across …
Featured news
Resources
Don't miss
- Windows Notepad Markdown feature opens door to RCE (CVE-2026-20841)
- 1Password open sources a benchmark to stop AI agents from leaking credentials
- Apple fixes zero-day flaw exploited in targeted attacks (CVE-2026-20700)
- When security decisions come too late, and attackers know it
- OpenClaw Scanner: Open-source tool detects autonomous AI agents