Expert analysis
The threat within: Protecting information assets from well-meaning employees
Most information security experts will agree that employees form the weakest link when it comes to corporate information security. Malicious insiders aside, well-intentioned …
Q&A: PCI compliance
Jim Bibles is a Product Manager at Qualys currently directing the development and enhancement of the company’s QualysGuard PCI solution. His security background ranges …
A closer look at Kaspersky Internet Security 2010
Kaspersky Internet Security is security software that offers protection against viruses, spyware, spam, identity theft and phishing. It also has parental and privacy controls. …
Q&A: Penetration testing
Thomas Wilhelm is an associate professor at Colorado Technical University and also employed at a Fortune 20 company performing penetration testing and risk assessments and has …
Internet vault with built-in data inheritance
DataInherit, a new online data storage service with built-in data inheritance has been offered by DSwiss AG, a Swiss bank for information assets owned partly by Avantec. …
Q&A: OSSEC, the open source host-based intrusion detection system
Daniel B. Cid is the founder of the open source OSSEC HIDS and a principal researcher at Trend Micro. He has a special interest in intrusion detection, log analysis and secure …
10 software apps for encryption for the Mac
In this day and age, nobody can afford NOT to use encryption, and the sooner we all get used to using it on a daily basis, the better. We live in a world where secrets are …
Q&A: Vulnerability management
Eric Perraudeau is the product manager for QualysGuard vulnerability management (VM) solutions. Prior to Qualys, Eric was a security engineer at Accor and Morse in France. In …
Q&A: Windows forensics
Harlan Carvey, CISSP, is a computer security engineer and book author. He has conducted penetration tests and vulnerability assessments in support of corporate and federal …
A closer look at Elcomsoft Advanced Office Password Breaker 3 Enterprise Edition
Elcomsoft Advanced Office Password Breaker breaks passwords and unlocks password-protected MS Word documents and Excel spreadsheets instead of attacking and recovering complex …
Firewire-based physical security attacks on Windows 7, EFS and BitLocker
This paper discusses Firewire-based physical security attacks on Microsoft Windows 7. In the course of his research, the author was successfully able to bypass the Windows 7 …
Securing virtualized environments
IT departments are under immense pressure to deliver more functionality and capacity at a time when budgets are shrinking and costs are increasing. Mounting expenses from …
Featured news
Resources
Don't miss
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd
- Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
- The U.S. Cyber Trust Mark set to launch
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
- Why an “all gas, no brakes” approach for AI use won’t work