Expert analysis
The Rise and Rise of Rogue Security Software
Rogue security software is an application that appears to be beneficial from a security perspective but provides little or no security, generates erroneous alerts, or attempts …
What To Do About Social Networking In Your Company
The growing popularity of social networking sites such as Facebook, Bebo and MySpace is slowly developing into a massive headache for IT administrators as employees spend time …
Protecting Corporate Brands: One Keystroke at a Time
Enterprises spend a great deal of time and money building up their brand identity, and for good reason. It’s not only a primary component to an organization’s …
Safe Computing During The Holiday Season
The holiday season is a time of increased online activity. During the hustle and bustle that surrounds this time of year, what’s more convenient than saving a little …
Attacks On Banks
This article provides an overview of the methods currently used by cyber criminals to attack financial institutions and banks in particular. It reviews general trends and …
Trust No One
It’s easy to say what we’re all securing our systems and data against. But isn’t easy to say exactly who we need to secure against, nor who presents the …
Lavasoft and the antispyware industry
In this video, Lavasoft CEO Jason King offers a brief history of Lavasoft and its role in the antispyware industry, the growth of the company, the shift in the marketplace as …
Q&A: Software Piracy
Jan Samzelius is the CEO and one of the founders of ByteShield, a company whose mission is protecting PC software applications and games against illegal copying. Let’s …
PCI Sample Encryption Key Management Documentation
In the four years since merchants were required to comply with the Payment Card Industry Data Security Standards (PCI-DSS), CTG has found many clients still struggling with …
Q&A: Mobile Forensics
Aviad Ofrat is the CEO of Cellebrite and in this interview discusses mobile forensics as well as the Universal Forensic Extraction Device. In your opinion, how important is a …
Building C-Level Confidence with a Security Blueprint
IT professionals wear many hats these days. Not only are they charged with keeping the lights on, they must establish and maintain a defined security posture, ensure …
Q&A: Threats to the US critical communications infrastructure
Paul Parisi is the CTO of DNSstuff.com and has an extremely broad and deep technical background offering reality based solutions to everyday issues. In this interview he …