Expert analysis
Policing your IT police: Proactive security
When the global economy is in slowdown, there’s one sector that remains buoyant: crime. Illegal and illicit activities invariably rise as legitimate business falls, so …
A closer look at System Surveillance Pro 5.5
System Surveillance Pro logs keystrokes, monitors applications, tracks visited websites, records instant message conversations and captures screenshots of the computer …
Exploring the boundaries of IT security
As Niels Bohr once said, prediction is difficult, especially about the future. Nevertheless, almost all network security companies try to assess risk and the potential impact …
Backup WordPress automatically with Backupify
You backup your computer, but do you backup your online activities? The typical Internet user nowadays uses a variety of services such as Flickr or Twitter, runs a WordPress …
Q&A: SOURCE Conference
Stacy Thayer is the Founder and Executive Director of SOURCE Conferences. Prior to founding SOURCE Conferences, Stacy was employed for a Fortune 500 company, where she worked …
Tokenization: A new approach to enterprise data security
As enterprises seek to protect data from cybercriminals, internal theft or even accidental loss, encryption and key management have become increasingly important and proven …
Google Buzz for spammers
The Google Buzz sign-up is being advertised to users when logging into Gmail, and is a fairly transparent process to users with an existing Gmail account. Clicking on …
Will virtualization and cloud computing change how we achieve security?
The virtues of virtualization and cloud computing will figure in most enterprise IT infrastructure discussions during 2010. Virtualization has already proven its worth in …
The four myths of cyber security
Governments and corporations around the globe are facing a crisis in the form of cyber security threats. Incidents and exploits crafted by an effective and growing menace are …
A closer look at USB Secure 1.3.0
USB Secure helps you password protect USB drives, thumb drives, memory cards, external drives and flash drives. It supports plug and play and runs automatically once a USB …
Is authenticated XSS a problem?
Obviously, see cross-site scripting (XSS) is a big problem on the public Web. But there’s another angle to XSS that no one seems to be talking about – at least I …
A closer look at File Encryption XP 1.5
File Encryption XP is a file and folder encryption program that uses the Blowfish algorithm with a 384-bit key. The files are completely self-contained which means that, if …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd