Please turn on your JavaScript for this page to function normally.
The economy and cyber crime

In this uncertain global economy, you can count on one thing: crime – both in the real world and the online one – has the opportunity to thrive. According to a …

Banning wireless doesn’t stop users

Wireless LANs (WLANs) are increasingly becoming a commodity in the home, in the high street, at the airport – everywhere but in the office it seems. This is because it …

What to do about social networking in your company

The growing popularity of social networking sites such as Facebook is slowly developing into a massive headache for IT administrators as employees spend time updating their …

Q&A: Malware Trends

Marc Fossi manages research and development for Symantec Security Response where his primary role is executive editor of the Symantec Internet Security Threat Report. The …

Secure start-up for POS

Secure start-up of encryption services in a typical retail POS configuration can be provided by implementing the following (very general) best practices. Each Local Security …

Keeping Virtual Security Real

Remember the first time you drove a car on your own, and you’d get a kick from the sensation of sheer speed? Unfortunately, you also have to learn the mundane stuff like …

Q&A: Government Security and Mobile Devices

Joseph Hagin is the Former Deputy White House Chief of Staff. In that role he had a high-level of concern about hacking and other security concerns related to …

Towards Kerberizing Web Identity and Services

Today authentication and authorization are addressed in an incoherent, and often site-specific, fashion on the Internet and the Web specifically. This situation stems from …

Applied Binary Code Obfuscation

An obfuscated code is the one that is hard (but not impossible) to read and understand. Sometimes corporate developers, programmers and malware coders for security reasons, …

Q&A: RSA Conference 2009

Sandra Toms LaPedis, Area Vice President and General Manager of RSA Conferences, is responsible for global promotion and successful execution, including strategy, brand …

What the Heartland Data Breach Tells Us

The recent data breach at Heartland Payment Systems should make one thing clear: the standards for security around credit card numbers still aren’t good enough. New …

Code Review or WAFs? PCI 6.6

Short answer: both. Compliance with requirement 6.6 of the PCI DSS cites the use of either a web application firewall (WAF) or code review. It’s far more effective to …

Don't miss

Cybersecurity news