Please turn on your JavaScript for this page to function normally.
Holiday tips for laptop security

Summer is the time when most countries have the longest vacation periods. Regardless of whether the holiday is spent indoors or outdoors, at home or overseas, most people …

VPN market choices: Aligning network planning to enterprises’ security and mobility requirements

Virtual Private Networks (VPNs) are an essential part of enterprises’ IT security policies. Unfortunately, with the variety of mobile device applications, empowering …

Safety in the cloud(s): ‘Vaporizing’ the Web application firewall to secure cloud computing

Cloud computing was not designed for security, although organizations such as Cloud Security Alliance (CSA) and Open Web Application Security Project (OWASP) are making great …

A closer look at Nero BackItUp & Burn

Nero BackItUp & Burn lets you back up files to your hard drive or to online storage, schedule automatic backups, burn music, videos, photos, and data to CDs, DVDs, and …

Memo to CIOs: Your next security crisis may have nothing to do with cyber attacks

I must admit I’m as much to blame here as anyone. After all, I’m the head of a company that prides itself on offering security appliances that will halt any …

Q&A: Privacy and anonymity with Tor

Andrew Lewman is executive director of The Tor Project, a non-profit organization providing research and free software that protects your online privacy and anonymity. He is a …

Q&A: Cain & Abel, the password recovery tool

Massimiliano Montoro is the mastermind behind Cain & Abel, the password recovery tool for Windows. In this interview he provides insight on the history of the tool, the …

A closer look at SpywareBlaster 4.2

SpywareBlaster prevents the installation of ActiveX-based spyware, adware, dialers, browser hijackers, and other potentially unwanted programs. It can also block …

A closer look at Little Snitch 2.1.4

Little Snitch is a Mac tool that protects private data from undesirable transmission. It informs you whenever a program attempts to establish an outgoing Internet connection. …

Q&A: The Kantara Initiative and the global identity landscape

Roger Sullivan serves as president of the Kantara Initiative Board of Trustees and president of the Liberty Alliance Management Board. He is vice president, Oracle Identity …

A closer look at Spybot – Search & Destroy 1.6.2

Spybot – Search & Destroy can detect and remove adware files and modules from your computer. Spybot also can clean program and Web-usage tracks from your system. …

The evolution of Qualys

Qualys CEO Philippe Courtot discusses the evolution of Qualys, from the early days to current projects and future ideas.

Don't miss

Cybersecurity news