Expert analysis
The Extended HTML Form Attack Revisited
HTML forms are one of the features in HTTP that allows users to send data to HTTP servers. An often overlooked feature is that due to the nature of HTTP, the web browser has …
Q&A: Software-as-a-Service and Threat Management
Misha Govshteyn is the CTO and responsible for security strategy, security research and operations at Alert Logic. In this interview he discusses Software-as-a-Service (SaaS), …
Reverse Engineering: Anti-Cracking Techniques
This paper is a guide into better understanding most of the approaches a reverse engineer can follow in order to achieve his goal. Additionally, it includes a number of …
Q&A: The Threat of Malware to Mobile Phones
Richard R. Roscitt is the CEO of SMobile Systems. He keynoted at world-class forums and is regularly featured in leading business and industry trade print and electronic …
Q&A: The DNSChanger Trojan
Christoph Alme is the Principal Engineer and Team Lead of anti-malware research at Secure Computing Corporation. He is the inventor of several patent-pending key technologies …
C2 Systems: No Longer a Proprietary Issue
The past five years have seen remarkable transformation in how military Command and Control (C2) systems are designed and procured. Proprietary and costly custom developed …
Choosing the Right Security Personnel
In the new edition of the HNS podcast, Simon Heron from Network Box discusses why choosing the right security personnel is every bit as important as opting for the right …
Cyber Security Coordination
There’s been much discussion of late regarding the perceived lack of expediency by federal agencies to identify and prioritize critical cyber infrastructure needs. The …
Q&A: iPhone Security and the Enterprise Market
Jesper Svegby is the Director of Business Development for the Mobile group at Check Point. With more than 10 years of experience in the Mobility and IT-security community …
PCI Compliance Explained
Learn about the Payment Card Industry Data Security Standard (PCI DSS), a security standard that includes requirements for security management, policies, procedures, network …
The Rise of User Circumvention and Risky Unauthorized Activities
In the new edition of the HNS podcast, Chris King from Palo Alto Networks discusses user circumvention – how end users are actively skirting IT security controls with …
Payment Card Industry Mandate Stresses Importance of Web Application Security: Recommended Becomes Required
On June 30, another refresh of the Payment Card Industry (PCI) Data Security Standards (PCI DSS) will upgrade Web application security testing from a best practice to a …
Featured news
Resources
Don't miss
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024