Please turn on your JavaScript for this page to function normally.
Q&A: Security Visualization

As chief security strategist and director of application product management, Raffael Marty is customer advocate and guardian – expert on all things security and log …

Q&A: Virtualization Security

Jim Chou is the Executive VP of Technology for Apani where he is responsible for the strategic technical development of Apani technology and product portfolio development. In …

Q&A: Views on Privacy and Identity Theft

Jonathan Moneymaker is VP of Operations at Anonymizer. He is a certified Project Management Professional and also holds a BS in Systems Engineering from the University of …

Q&A: E-mail spam and Software as a Service (SaaS) solutions

David Vella is the Director of Product Management at GFI with experience in quality assurance, network administration and software development. In this Q&A he provides …

Q&A: SSL VPN Security

Max Huang is the founder and Executive Vice President of O2Micro and President for O2Security, a subsidiary company of O2Micro. In this interview he discusses the importance …

Q&A: Web 2.0 Security

Sam Masiello oversees the MX Logic Threat Operations Center. Masiello has more than 18 years of email systems and IT management experience, including nearly 10 years network …

Q&A: E-mail Security Threats and Countermeasures

David Vella is the Director of Product Management at GFI with experience in quality assurance, network administration and software development. In this Q&A he provides …

Backup & Recovery

The undeniable importance of backup is the reason why system administrators invest time and effort into creating and maintaining a backup system fit for their infrastructure. …

Interview with Chris Sanders, Author of “Practical Packet Analysis”

Chris Sanders is a Senior Support Engineer for KeeFORCE, a technology consulting firm. Chris writes and speaks on various topics including packet analysis, network security, …

The Book of Wireless (2nd Edition)

In the last couple of years Wi-Fi has become a household name and wireless networks are now practically everywhere. Despite the proliferation of wireless Internet access, …

Mac OS X Leopard: The Missing Manual

Immediately after its release, Mac OS X Leopard became a big hit. Apple sold 2 million copies of the innovative operating system in the first weekend alone. With more than 300 …

Interview with Gregory Conti, Assistant Professor of Computer Science at the United States Military Academy

Besides his work as a professor and Director of the Information and Technology and Operations research center, Gregory Conti is also the author of the excellent book Security …

Don't miss

Cybersecurity news