Expert analysis
New approach to SQL injection detection
In this podcast recorded at RSA Conference 2014, Dave Rosenberg, CTO at DB Networks, talks about a new approach to SQL injection detection and explains how they solve this …
The security of embedded devices
Embedded devices are everywhere and they make our lives more convenient, but from a security standpoint, they can be intimidating, especially if we’re talking about an …
Video: RSA Conference 2014 showcase
The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2014. Here’s a closer look at the show, watch …
NIST announces security framework… yawn
Let me start out by saying that I have a bias against regulatory compliance standards; especially those that are non-specific, not prescriptive, require voluntary cooperation …
Less risk, more reward: Managing vulnerabilities in a business context
Network security can be both an organization’s savior, and its nemesis. How often does security slow down the business? But security is something you can’t run …
The time for responsible reporting has come
The beginning of the year is when budgets for the forthcoming year are made available, when many new projects are teed off, and the security conference season starts. It is …
Security awareness training: Why it matters
Dr. Peter Lokhorst is Managing Director of InfoSecure BV, which is currently in seven countries and provides awareness training programs to international clients including …
Doing more to protect your DNS from DDoS
According to a recent Arbor Networks report on infrastructure security, the number of DDoS attacks on enterprise DNS servers is on the rise but, despite this, many businesses …
Tips for handling your first security breach
When it comes to data breaches, the risk for organizations is higher than ever before – from the calculable costs of leaked data to the less tangible effects on the …
Top ten points in the fight against cybercrime
At a summit of regulators and intelligence chiefs yesterday, the business secretary, Vince Cable, issued a timely warning to all in attendance of the vulnerability of …
Five lessons we can learn from financial services and compliance
Banks and financial services organisations have been a prime target for hackers for a very long time, and as a result of this the industry has had to adhere to security …
Defending against drive-by downloads
In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users