Please turn on your JavaScript for this page to function normally.
Protecting SOA Against Internal Attacks

It is critical to have a good understanding of the data flow in order to select the optimal protection approach at different points in the enterprise. By properly …

Q&A: Current Security Threats

Simon Heron is an Internet Security Analyst at Network Box, a managed security company, where he is responsible for developing the overall business strategy and growth. In …

Web Application Firewalls and PCI DSS

We all know that time is a critical factor in selecting solutions to prevent breaches. Web Application Firewalls (WAF) are the most effective mechanisms to immediately address …

Tackling the authentication nightmare

In the new edition of the HNS podcast, Jonathan Craymer, chairman of GrIDsure talks about tackling the authentication nightmare by getting the right balance between security …

Q&A: InfoSec World Conference and Expo

Jean Hey serves as Vice President of Conferences for MIS Training Institute. In this capacity she has been responsible for over 100 conferences, many of which focus on …

SIEM: the Answer to Awkward Security Questions

What’s the one security question that you don’t want to be asked about your company? I believe it’s the same question that Her Majesty the Queen raised when …

Security Trends of 2008 and Predictions for 2009

As a new year approaches we must prepare for new Internet security threats. Every year, new and innovative ways of attacking computer users emerge and continue to increase in …

The Rise and Rise of Rogue Security Software

Rogue security software is an application that appears to be beneficial from a security perspective but provides little or no security, generates erroneous alerts, or attempts …

What To Do About Social Networking In Your Company

The growing popularity of social networking sites such as Facebook, Bebo and MySpace is slowly developing into a massive headache for IT administrators as employees spend time …

Protecting Corporate Brands: One Keystroke at a Time

Enterprises spend a great deal of time and money building up their brand identity, and for good reason. It’s not only a primary component to an organization’s …

Safe Computing During The Holiday Season

The holiday season is a time of increased online activity. During the hustle and bustle that surrounds this time of year, what’s more convenient than saving a little …

Attacks On Banks

This article provides an overview of the methods currently used by cyber criminals to attack financial institutions and banks in particular. It reviews general trends and …

Don't miss

Cybersecurity news