Please turn on your JavaScript for this page to function normally.
The threat within: Protecting information assets from well-meaning employees

Most information security experts will agree that employees form the weakest link when it comes to corporate information security. Malicious insiders aside, well-intentioned …

Q&A: PCI compliance

Jim Bibles is a Product Manager at Qualys currently directing the development and enhancement of the company’s QualysGuard PCI solution. His security background ranges …

A closer look at Kaspersky Internet Security 2010

Kaspersky Internet Security is security software that offers protection against viruses, spyware, spam, identity theft and phishing. It also has parental and privacy controls. …

Q&A: Penetration testing

Thomas Wilhelm is an associate professor at Colorado Technical University and also employed at a Fortune 20 company performing penetration testing and risk assessments and has …

Internet vault with built-in data inheritance

DataInherit, a new online data storage service with built-in data inheritance has been offered by DSwiss AG, a Swiss bank for information assets owned partly by Avantec. …

Q&A: OSSEC, the open source host-based intrusion detection system

Daniel B. Cid is the founder of the open source OSSEC HIDS and a principal researcher at Trend Micro. He has a special interest in intrusion detection, log analysis and secure …

10 software apps for encryption for the Mac

In this day and age, nobody can afford NOT to use encryption, and the sooner we all get used to using it on a daily basis, the better. We live in a world where secrets are …

Q&A: Vulnerability management

Eric Perraudeau is the product manager for QualysGuard vulnerability management (VM) solutions. Prior to Qualys, Eric was a security engineer at Accor and Morse in France. In …

Q&A: Windows forensics

Harlan Carvey, CISSP, is a computer security engineer and book author. He has conducted penetration tests and vulnerability assessments in support of corporate and federal …

A closer look at Elcomsoft Advanced Office Password Breaker 3 Enterprise Edition

Elcomsoft Advanced Office Password Breaker breaks passwords and unlocks password-protected MS Word documents and Excel spreadsheets instead of attacking and recovering complex …

Firewire-based physical security attacks on Windows 7, EFS and BitLocker

This paper discusses Firewire-based physical security attacks on Microsoft Windows 7. In the course of his research, the author was successfully able to bypass the Windows 7 …

Securing virtualized environments

IT departments are under immense pressure to deliver more functionality and capacity at a time when budgets are shrinking and costs are increasing. Mounting expenses from …

Don't miss

Cybersecurity news