Expert analysis
Network security facing dual challenge
Network security systems are under pressure. You might not be experiencing it yet, but you will soon. The dual challenge of dealing with more attacks at higher speeds …
Does application security pay?
The last decade has seen a dramatic shift in the way companies manage information security and protect vital data. In the past, businesses confronted the threat of cyber …
PacketWars: A cyber security sport for a cyber age
In this day and (cyber)age, hacking contests are sprouting like mushrooms after the rain – and it’s a good thing they do. For what better venue is there for …
How to choose a web vulnerability scanner
Robert Abela is a Technical Manager at Acunetix and in this interview he discusses the process of choosing a web vulnerability scanner and underlines several factors that …
Inside the mind of a computer forensics investigator
Jess Garcia, founder of One eSecurity, is a senior security engineer and an active security researcher in areas of incident response, computer forensics and honeynets. In this …
A closer look at NetShade for Mac
NetShade (v.4.0.1) makes your presence on the web anonymous by routing your connection through a proxy server and acting as the middle-man in your connection. The proxy server …
A closer look at Sophos Anti-Virus for Mac Home Edition
The Home Edition of Sophos’ Anti-Virus for Mac is a full-featured and free anti-virus solution for home users. It stops, quarantines and cleans up threats that try to …
Smart grid security facts
Tony Flick has worked for over eight years in the security industry and is currently a Principal with Tampa-based FYRM Associates. He has presented at Black Hat, DEF CON, …
No big bang in PCI 2.0
As expected, PCI 2.0 rolls up a number of minor changes, but there really is no Big Bang in this document. A number of people have been disappointed by this since for the past …
Fixing weak passwords
Passwords have been present in information technology since the earliest days, but it’s only in the last five years that computers have become powerful enough to crack …
Cloud security risks, benefits and cost savings
Harold Moss is the Emerging Tech & Cloud Computing Technical Architect, IBM Security Strategy. In this interview he talks about the security of cloud service providers, …
A closer look at Watchmac
Watchmac (v.1.6) is a handy piece of software that will tell you if someone has fiddled with your laptop while you were gone – moved it, removed its battery or unplugged …