Expert analysis
Video interview with George P. Japak, Vice President of ICSA Labs
In this video Mr. Japak talks about the importance of product certification, the full disclosure of vulnerabilities, how ICSA Labs approaches product testing, how they …
Adaptive and Behavioral Approach to New Threats
A wake up call It was early morning on a typical business day when an intrusion detection system generated an alert of unusual TCP activity at a customer’s Boston branch …
Password Overload Syndrome – The Latest Disorder Ravaging The IT Industry
I’ve got password overload syndrome! When I went to see my doctor he quietly admitted it had got him too – as he fumbled to access my notes on-screen? The chap at …
Sarbanes-Oxley: An Opportunity for Security Professionals
Sarbanes-Oxley (SOX) is not just another regulation security professionals have to contend with in your already very busy lives. Instead, SOX should be viewed as opportunity …
Why “Identity” Is Central To IT Security
The increasing demand from our users to provide “Anywhere Access’ to our most sensitive business systems; allowing them to connect from any computing device across …
Scope on Application Vulnerability Description Language
The Application Vulnerability Description Language (AVDL) is a rather new security interoperability standard within the Organization for the Advancement of Structured …
The Spyware Threat And How To Deal With It
Spyware aka advertising-supported software or adware – has been until recently a fairly benign snooper on your surfing habits. The data it gathers is then used to target …
Windows Mobile Pocket PC Security
Seth Fogie, VP of Dallas-based Airscanner Corporation presents the latest in our series of security audio sessions. Mr. Fogie, an expert in the field of mobile computing …
Passwords – Common Attacks and Possible Solutions
Overview Making sure authorized users have access to either sensitive company information or their personal e-mail can be a daunting task, given the fact that an average user …
An IT Manager’s Insight Into Securing Removable Media
When I last looked on the Internet to buy a USB memory stick, I found that for a few hundred pounds I could purchase a 4 gigabyte device the size of a pen. That’s a lot …
Not A Patch On The New Breed Of Cyber-Criminal
The cyber-criminal is getting smarter and more organised and alongside this as have their methods of attack. Whereas 2 years ago the watchword was computer viruses, now new …
RSA Conference Europe 2004 Showcase Video
Here’s a showcase of the RSA Conference Europe 2004 in Barcelona. The video is 3:44 minutes in length, available in Windows Media 9 256K (6.9 MB) and 64K (1.7 MB). Click …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research