Expert analysis
Online backup or cloud recovery?
Backing up files and data online has been around for quite a while, but it has never really taken off in a big way for business customers. There is also a new solution coming …
10 add-ons for Firefox: Privacy and security
For all of you Firefox users out there, here is a list of handy plug-ins and add-ons that will help you anonymize your Web presence, protect you from loss of passwords, …
Data leakage plan of action
Tiny computing and storage devices have revolutionized the way people carry information as they can stow the equivalent of millions of pages of data. Yet this benefit is also …
A closer look at Microsoft Security Essentials
Microsoft has released a free (for personal use) anti-malware service that protects against viruses, spyware and other malicious software. Security Essentials is designed to …
Five best practices for mitigating insider breaches
Mismanagement of processes involving privileged access, privileged data, or privileged users poses serious risks to organizations. Such mismanagement is also increasing …
Malicious PDF files
In this video, recorded at BruCON, security researcher and expert on malicious PDF files Didier Stevens discusses how these files work and offers protection tips.
Encryption is the equivalent of a seat belt for data
The quantity of electronic data relied upon by both the private and public sectors alike are increasing at a rapid rate. Before we go further let’s just clarify what is …
A closer look at IObit Security 360 1.0
IObit Security 360 is a malware and spyware removal tool that detects, removes the deepest infections, and protects your PC from spyware, adware, trojans, keyloggers, bots, …
Q&A: Splunk
In this interview the Splunk team discusses Splunk in detail. What is Splunk? Splunk was born from its founders’ frustration in running some of the worlds largest IT …
BruCON: Hackers descend on Belgium
After visiting several computer security events and being impressed by the energy and the open exchange of knowledge, a small group of people dreamed of creating a hacker …
Dissecting the hack: the f0rb1dd3n network
In this video, recorded last week at BruCON, Jayson Street talks about his book – “Dissecting the hack: the f0rb1dd3n network” – published by Syngress. …
Q&A: Information assurance
Ravinderpal “Ravi” Sandhu is The University of Texas at San Antonio (UTSA)’s Lutcher Brown distinguished chair in cyber security and the executive director …
Featured news
Resources
Don't miss
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd
- Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
- The U.S. Cyber Trust Mark set to launch
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
- Why an “all gas, no brakes” approach for AI use won’t work