Expert analysis
Interview with Chris Sanders, Author of “Practical Packet Analysis”
Chris Sanders is a Senior Support Engineer for KeeFORCE, a technology consulting firm. Chris writes and speaks on various topics including packet analysis, network security, …
Data Loss Prevention: Where Do We Go From Here?
DLP is fast becoming one of the most overused yet misunderstood acronyms in an industry known for its cryptic abbreviations. The popular label for data loss prevention is …
HNS Podcast: InfoSec World Conference & Expo
Jean Hey, Vice President of MIS Trainining Institute talks about InfoSec World Conference & Expo, event that the Help Net Security staff attended in early March. In this …
HNS Podcast: Vulnerability Management Considerations
In this HNS podcast, Anthony Alves from CORE Security Technologies discusses briefly vulnerability management. He covers some of the things you should consider while …
Empirical Exploitation of Live Virtual Machine Migration
As virtualization continues to become increasingly popular in enterprise and organizational networks, operators and administrators are turning to live migration of virtual …
Guard Against Cyberspace Threats
With the changing nature of threats in cyberspace, the need is growing to absorb attacks and to protect online identities against both high-profile and stealthy infiltration …
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Web-based applications and services have changed the landscape of information delivery and exchange in today’s corporate, government, and educational arenas. Ease of …
Change and Configuration Solutions Aid PCI Auditors
To the casual observer of the Payment Card Industry (PCI) standard, it might seem that the standard deals exclusively with the servers and point-of-sale terminals that house …
Network Access Control: Bridging the Network Security Gap
The business work place has evolved significantly over the last ten years. Back then, networks were far more simplistic; the internet was not a critical business tool, there …
Securing Moving Targets
Newton’s first law of motion states that a moving body will want to keep moving. The same law also seems to apply to business data, and the problem is trying to stop …
Interview with Gregory Conti, Assistant Professor of Computer Science at the United States Military Academy
Besides his work as a professor and Director of the Information and Technology and Operations research center, Gregory Conti is also the author of the excellent book Security …
The Future of Encryption
In today’s world the protection of sensitive data is one of the most critical concerns for organizations and their customers. This, coupled with growing regulatory …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025