Expert analysis
Overcoming the hacker hurdle during the Olympics
During the Beijing Olympics it’s reported there were upwards of 12 million “cyber security incidents” per day . Hacking has evolved tremendously since …
Five steps for a secure cloud transition
Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest …
What’s going on with the Cybersecurity Act of 2012?
This week we have witnessed a heated debate between US Senators who showed opposite opinions on the Cybersecurity Act of 2012, a bill aimed at regulating a number of important …
IPv6 and click fraud
The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4. The bad news: Spammers …
Do you need a honeypot?
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …
Exploring the world of digital forensics
Jess Garcia, founder of One eSecurity, is a senior security engineer and an active security researcher in areas of incident response, computer forensics and honeynets. In this …
Enterprise log managers: An unsexy but vital tool
Ultimately, the goal of Enterprise Log Management (ELM) is to get your most critical events escalated to your operations staff to react and respond with the appropriate …
Monitoring the quality of SSL support
Ivan Ristic, Director of Engineering at Qualys, talks about SSL Pulse – a continuous and global dashboard for monitoring the quality of SSL support across the top one …
Firewall management, IPv6 and you
Created 30 years ago, IPv4 has a 32-bit addressing scheme and can support approximately 4.3 billion devices connected directly to the Internet. Well aware that IPv4 addresses …
The fluctuation of compliance
After this weekend, all retailers accepting payment card transactions will be expected to either use a specialized firewall for protecting their Web applications or to have …
Do passwords matter?
You don’t have to look very hard to find an article discussing password breaches. Recently, there was a lot of buzz around LinkedIn, Last.fm, and eHarmony, three very …
Removing the fear factor from BYOD
In May, HM Revenue and Customs (HMRC) said that it would ignore the government’s advice on BYOD (bring your own device) because of concerns around the security of the …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users