Expert analysis
A closer look at Sophos Anti-Virus for Mac Home Edition
The Home Edition of Sophos’ Anti-Virus for Mac is a full-featured and free anti-virus solution for home users. It stops, quarantines and cleans up threats that try to …
Smart grid security facts
Tony Flick has worked for over eight years in the security industry and is currently a Principal with Tampa-based FYRM Associates. He has presented at Black Hat, DEF CON, …
No big bang in PCI 2.0
As expected, PCI 2.0 rolls up a number of minor changes, but there really is no Big Bang in this document. A number of people have been disappointed by this since for the past …
Fixing weak passwords
Passwords have been present in information technology since the earliest days, but it’s only in the last five years that computers have become powerful enough to crack …
Cloud security risks, benefits and cost savings
Harold Moss is the Emerging Tech & Cloud Computing Technical Architect, IBM Security Strategy. In this interview he talks about the security of cloud service providers, …
A closer look at Watchmac
Watchmac (v.1.6) is a handy piece of software that will tell you if someone has fiddled with your laptop while you were gone – moved it, removed its battery or unplugged …
Wireless security considerations
Brad Haines is chief researcher of Renderlab.net and a noted expert in the field of wireless security. Brad has spoken at many international conferences and taught several …
Past, present and future of Metasploit
HD Moore is the CSO at Rapid7 and Chief Architect of Metasploit, an open-source penetration testing platform. HD founded the Metasploit Project with the goal of becoming a …
A closer look at SafeWallet for Mac
SafeWallet (v.1.0) is a password manager in which you can store all your passwords and all your private information that you want to have handy but accessible only to you …
Current threats and the evolution of cybercrime
Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is actively involved with SANS working with students, teaching, and maintaining and developing …
Private key management: Real world tips
It has always been taken for granted that the entire IT security industry understands that, as part of digital certificate management, it is necessary to manage the private …
Requirements of cloud-based network security
While some of the technical underpinnings that make up the cloud’s “secret sauce’, are relatively recent innovations, the business case for managing critical …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users