Please turn on your JavaScript for this page to function normally.
The Rise and Rise of Rogue Security Software

Rogue security software is an application that appears to be beneficial from a security perspective but provides little or no security, generates erroneous alerts, or attempts …

What To Do About Social Networking In Your Company

The growing popularity of social networking sites such as Facebook, Bebo and MySpace is slowly developing into a massive headache for IT administrators as employees spend time …

Protecting Corporate Brands: One Keystroke at a Time

Enterprises spend a great deal of time and money building up their brand identity, and for good reason. It’s not only a primary component to an organization’s …

Safe Computing During The Holiday Season

The holiday season is a time of increased online activity. During the hustle and bustle that surrounds this time of year, what’s more convenient than saving a little …

Attacks On Banks

This article provides an overview of the methods currently used by cyber criminals to attack financial institutions and banks in particular. It reviews general trends and …

Trust No One

It’s easy to say what we’re all securing our systems and data against. But isn’t easy to say exactly who we need to secure against, nor who presents the …

Lavasoft and the antispyware industry

In this video, Lavasoft CEO Jason King offers a brief history of Lavasoft and its role in the antispyware industry, the growth of the company, the shift in the marketplace as …

Q&A: Software Piracy

Jan Samzelius is the CEO and one of the founders of ByteShield, a company whose mission is protecting PC software applications and games against illegal copying. Let’s …

PCI Sample Encryption Key Management Documentation

In the four years since merchants were required to comply with the Payment Card Industry Data Security Standards (PCI-DSS), CTG has found many clients still struggling with …

Q&A: Mobile Forensics

Aviad Ofrat is the CEO of Cellebrite and in this interview discusses mobile forensics as well as the Universal Forensic Extraction Device. In your opinion, how important is a …

Building C-Level Confidence with a Security Blueprint

IT professionals wear many hats these days. Not only are they charged with keeping the lights on, they must establish and maintain a defined security posture, ensure …

Q&A: Threats to the US critical communications infrastructure

Paul Parisi is the CTO of DNSstuff.com and has an extremely broad and deep technical background offering reality based solutions to everyday issues. In this interview he …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools