Expert analysis
Super Power Password Protection – Watching You Watching Me
Not a day goes by without some story hitting the wires about yet another piece of confidential information appearing in somebody’s inbox. Confidential emails, files, …
Data Storage Security – Quo Vadis
Today, industry trends are forcing security in the data center to be re-thought. In particular, the trend towards consolidation results in increasingly centralised data …
Computers, Networks and Theft
Computers have become an integral part of our lives. Every day more and more users and organizations use them to store data which is a type of property. Although most people …
Interview with Marc Vaillant, CEO of Criston
Since the start of his career, Marc Vaillant has always worked in the high-tech sector, holding positions in companies of various sizes. Before joining Criston, he was Chief …
Data Protection Management: Shedding Light on Complex Infrastructures
Data protection strategies have become significantly more complex in recent years. Companies that used to rely on a single-vendor tape backup solution are now using disk-based …
Top 10 Web 2.0 Attack Vectors
Web 2.0 is the novel term coined for new generation Web applications. start.com, Google maps, Writely and MySpace.com are a few examples. The shifting technological landscape …
A New Approach To Data Protection And Management
In the struggle to ensure data protection, reduce backup windows, and manage costs – both capital and operational – IT managers face increasing challenges. …
Top 5 Tips to NOT Get Hacked Online
“Oh my God, I’m never doing anything on-line again!,” is a common reaction to one of my web application hacking presentations. Recently I’ve been …
Raman Amplification in Storage Area Networking
Enterprise requirements for business-continuity and disaster-recovery solutions continue to grow more demanding. An example can be found in the drive to lengthen the distances …
Using Pict Encrypt for steganography purposes on Mac OS X
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt …
Constructing Secure Storage Area Networks
Increasingly concerned about the availability of their business data, many enterprises over the last five years have implemented sophisticated storage area networks (SANs). …
Interview with Vladimir Katalov, CEO of ElcomSoft
Vladimir Katalov is working in ElcomSoft from the very beginning. He created the first program the password recovery software line has started from: Advanced ZIP Password …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?