Please turn on your JavaScript for this page to function normally.
Critical Steps to Secure Your Virtualized Environment

Virtualization is one of the hottest technologies in the data center today, and with good reason. The benefits are clear. Virtualization can help reduce the physical space of …

Interview with Jeremiah Grossman, CTO of WhiteHat Security

Jeremiah Grossman founded WhiteHat Security in 2001. Prior to WhiteHat, he was an Information Security Officer at Yahoo! responsible for performing security reviews on the …

The Right Formula for Data Leak Protection

Whether on the race track, on the web or in the boardroom, data leaks are invariably bad news. Just ask Ferrari and McLaren, the F1 giants embroiled in controversy over …

Interview with Edward Gibson, Chief Security Advisor at Microsoft UK

Mr. Gibson is the Chief Security Advisor for Microsoft in the UK. This role comes on the heels of his retirement from a 20-year career as a Supervisory Special Agent with the …

Online Games and Fraud: Using Games as Bait

We all play games. Some play sports, some gamble, and for some people, life itself is a game. Even computer games have become an everyday phenomenon, with millions of people …

A Closer Look at the CCNP Video Mentor

We were provided with a copy of the new Cisco Press multimedia publication “CCNP Video Mentor“. As you probably know, Cisco Press on a regular basis releases a …

Guide to Online Antivirus Solutions Part 6: ESET Online Scanner

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Practical 10 Minutes Security Audit: Oracle Case

This paper will show an extremely simple technique to quickly audit a software product in order to infer how trustworthy and secure it is. It will show you step by step how to …

Log Management in PCI Compliance

Security professionals have come to realize that ensuring data security and integrity is critical to business continuity and risk mitigation. However, with increasing amounts …

Reducing Shoulder-surfing by Using Gaze-based Password Entry

Shoulder-surfing – using direct observation techniques, such as looking over someone’s shoulder, to get passwords, PINs and other sensitive personal information …

Security Economics

Information security has finally become mainstream. It is almost a recognized profession, with its own areas of specialization: network security, audit, incident response, …

5 Security Widgets for the Opera Browser

Widgets are Web programs you can run right on your desktop using Opera 9. This article introduces security-related widgets that will enhance your Opera experience. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools