Expert analysis
Corporate espionage for dummies: HP scanners
Web servers have become commonplace on just about every hardware device from printers to switches. Such an addition makes sense as all devices require a management interface …
A closer look at GFI Backup 2010 Business Edition
Through GFI Backup’s central web-based administration console, administrators can configure and implement company-wide backup policies in a single task. Additionally, …
Network security challenges faced by universities
Striking a balance between an open yet secure network remains a challenge for university IT departments. While universities are often on the cutting edge of innovation, they …
Building secure software using fuzzing and static code analysis
The increased complexity of new technologies and faster software release cycles are making traditional reactive security solutions ineffective. Instead, more adaptable, …
Seven questions you should ask about deduplication
Deduplication has been one of the hottest technologies in the storage industry for almost three years. IT managers in most midrange data centers typically have limited staff …
Top scams and protection tips
Criminals are always preparing for the next major event from which to hitch a ride and launch an attack in an effort to dupe us into believing their lies. What is it about …
New data breach legislation
In the past two months, there have been two bills introduced in Washington, D.C. that are attempting to set nationwide standards for the security and privacy of …
SSL Labs: Researching the technology that protects the Internet
In this video recorded at Black Hat USA 2010, Ivan Ristic talks about SSL Labs – a non-commercial research effort and collection of documents and tools related to SSL. …
Five imperatives for extreme data protection in virtualized environments
Transforming an organization through server virtualization requires a strategic and coordinated approach. Data protection – which includes not only backup, but also …
A closer look at MacCleanse
MacCleanse (v. 2.0.6) is a small application that safely erases caches, logs, cookies, histories, and more. It provides detailed information on each item it cleanses, and can …
Security B-Sides: The anti-conference
Security B-Sides is a DIY, open security conference that is free to all attendees. These events are corporate sponsored, centrally managed (though locally organized) and do …
BlindElephant: Open source web application fingerprinting engine
In this video recorded at Black Hat USA 2010, Patrick Thomas, a vulnerability researcher at Qualys, discusses the open source web application fingerprinting engine …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd