Expert analysis
Can you trust a product that doesn’t have the right certification?
There are numerous organizations who, when looking for a new solution, will draw up a list of attributes products must have to proceed to the evaluation phase. FIPS …
A closer look at F-Secure Anti-Virus 2010
F-Secure Anti-Virus 2010 protects your computer against viruses, spyware, infected e-mail attachments, and other malware. It uses DeepGuard cloud computing technology to …
How to unlock the power of cloud computing
Which IT sector accounts for fully 25% of the industry’s year-over-year growth and, if the same growth trajectories continue, will generate about one-third of the IT …
20 ways to lose your database
Arguably an organizations’ most vital asset is its databases, often containing sensitive financial information, customer and employee data and intellectual property. …
A closer look at Rohos Logon Key for Mac
Rohos Logon Key for Mac (v2.3) can turn any USB flash drive, iPod, Bluetooth enabled mobile, iPhone, YubiKey, UmiKey, Swekey OTP token, or Touchatag device with RFID tags into …
Q&A: BruCON security conference
Sebastien Deleersnyder is an OWASP Foundation board member and one of the organizers of the BruCON security conference in Belgium. In this interview, he discusses this …
A closer look at East-Tec Eraser 2010
East-Tec Eraser 2010 (v. 9.7) protects your privacy, identity and confidential information while removing all evidence of your computer and online activity. It erases your …
Q&A: Infosecurity Russia. Storage Expo. Documation 2010
Alexandr Vlasov is a recognized expert in information security and personal data, working as a Business Development Executive at Groteck Business Media. In this interview he …
Five steps to cybersecurity risk assessment
Organizations face a constant barrage of cybersecurity threats. Botnets, malware, worms and hacking are just a few things that keep IT managers awake at night, wondering if …
A closer look at AVG LinkScanner for Mac
AVG LinkScanner for Mac (v. 9.0) checks each Web page in real time before it opens on your Mac. It supports Firefox and Safari. It runs silently in the background, and if the …
Q&A: Phishing explained
Dr. Jason Hong is the CTO and co-founder of Wombat Security Technologies, a provider of cyber-security training and filtering solutions. In this interview he discusses …
How hackers target teens
Imperva’s ADC has uncovered a new scheme targeting teens. How does it work? Hackers used a phishing attack to get credentials of the Habbo hotel social network, a social …