Expert analysis
Holiday tips for laptop security
Summer is the time when most countries have the longest vacation periods. Regardless of whether the holiday is spent indoors or outdoors, at home or overseas, most people …
VPN market choices: Aligning network planning to enterprises’ security and mobility requirements
Virtual Private Networks (VPNs) are an essential part of enterprises’ IT security policies. Unfortunately, with the variety of mobile device applications, empowering …
Safety in the cloud(s): ‘Vaporizing’ the Web application firewall to secure cloud computing
Cloud computing was not designed for security, although organizations such as Cloud Security Alliance (CSA) and Open Web Application Security Project (OWASP) are making great …
A closer look at Nero BackItUp & Burn
Nero BackItUp & Burn lets you back up files to your hard drive or to online storage, schedule automatic backups, burn music, videos, photos, and data to CDs, DVDs, and …
Memo to CIOs: Your next security crisis may have nothing to do with cyber attacks
I must admit I’m as much to blame here as anyone. After all, I’m the head of a company that prides itself on offering security appliances that will halt any …
Q&A: Privacy and anonymity with Tor
Andrew Lewman is executive director of The Tor Project, a non-profit organization providing research and free software that protects your online privacy and anonymity. He is a …
Q&A: Cain & Abel, the password recovery tool
Massimiliano Montoro is the mastermind behind Cain & Abel, the password recovery tool for Windows. In this interview he provides insight on the history of the tool, the …
A closer look at SpywareBlaster 4.2
SpywareBlaster prevents the installation of ActiveX-based spyware, adware, dialers, browser hijackers, and other potentially unwanted programs. It can also block …
A closer look at Little Snitch 2.1.4
Little Snitch is a Mac tool that protects private data from undesirable transmission. It informs you whenever a program attempts to establish an outgoing Internet connection. …
Q&A: The Kantara Initiative and the global identity landscape
Roger Sullivan serves as president of the Kantara Initiative Board of Trustees and president of the Liberty Alliance Management Board. He is vice president, Oracle Identity …
A closer look at Spybot – Search & Destroy 1.6.2
Spybot – Search & Destroy can detect and remove adware files and modules from your computer. Spybot also can clean program and Web-usage tracks from your system. …
The evolution of Qualys
Qualys CEO Philippe Courtot discusses the evolution of Qualys, from the early days to current projects and future ideas.