Expert analysis
The growth of keyloggers
Enterprise security has traditionally been centered around gateway protection, preventing unauthorized access from the outside and securing access to the Internet from inside …
Combating the rising cybercrime trend with SIEM
Judging from articles in the press, there appears to be a steady increase in the frequency of cybercrime. Whether it is one country attacking the infrastructure of another, or …
Security threats: A guide for small and medium businesses
A successful business works on the basis of revenue growth and loss prevention. Small and medium-sized businesses are particularly hit hard when either one or both of these …
The economy and cyber crime
In this uncertain global economy, you can count on one thing: crime – both in the real world and the online one – has the opportunity to thrive. According to a …
Banning wireless doesn’t stop users
Wireless LANs (WLANs) are increasingly becoming a commodity in the home, in the high street, at the airport – everywhere but in the office it seems. This is because it …
What to do about social networking in your company
The growing popularity of social networking sites such as Facebook is slowly developing into a massive headache for IT administrators as employees spend time updating their …
Q&A: Malware Trends
Marc Fossi manages research and development for Symantec Security Response where his primary role is executive editor of the Symantec Internet Security Threat Report. The …
Secure start-up for POS
Secure start-up of encryption services in a typical retail POS configuration can be provided by implementing the following (very general) best practices. Each Local Security …
Keeping Virtual Security Real
Remember the first time you drove a car on your own, and you’d get a kick from the sensation of sheer speed? Unfortunately, you also have to learn the mundane stuff like …
Q&A: Government Security and Mobile Devices
Joseph Hagin is the Former Deputy White House Chief of Staff. In that role he had a high-level of concern about hacking and other security concerns related to …
Towards Kerberizing Web Identity and Services
Today authentication and authorization are addressed in an incoherent, and often site-specific, fashion on the Internet and the Web specifically. This situation stems from …
Applied Binary Code Obfuscation
An obfuscated code is the one that is hard (but not impossible) to read and understand. Sometimes corporate developers, programmers and malware coders for security reasons, …