Expert analysis
Successful Backups Are Not Enough
Overview Data protection requirements have moved on from the purely technical question of “Did the backup work?” to the much more complex question of “Is my …
Limiting Vulnerability Exposure Through Effective Patch Management
This paper aims to provide a complete discussion on vulnerability and patch management. It looks first at the trends relating to vulnerabilities, exploits, attacks and …
Securing Wireless, Remote and Mobile Computing – Quick Fixes
The rapid growth of wireless, remote and mobile computing is creating a significant increase in the risks that organisations face. All the indications are that this growth …
The Ten Most Critical Wireless and Mobile Security Vulnerabilities
Inspired by the SANS Top 20, this list is a consensus of industry experts on wireless and mobile vulnerabilities that require immediate remediation. It is offered as a public …
Striking the Balance Between Storage Security and Availability
Every business owner knows that information is much more than one of an organization’s strategic resources. In a very real way, information is the organization. For IT …
Security for Websites – Breaking Sessions to Hack Into a Machine
Security on websites is based on session management. When a user connects to a secure website, they present credentials that testify to their identity, usually in the form of …
Microsoft Patch Tuesday Brings Eight Critical Vulnerabilities
Microsoft alerted us this time about 12 vulnerabilities of which eight were rated critical, three important and one moderate. Here comes another cumulative security update for …
Interview with Kenny Paterson, Professor of Information Security at Royal Holloway, University of London
The Information Security Group at Royal Holloway is one of the world’s largest academic research groups in information security, with about 15 permanent academic staff, …
How To Win Friends And Influence People With IT Security Certifications
“If you do not see the way, you do not see it even as you walk on it.” (Zen Koan) Huddled over a drink at the Appelmans Brasserie (and Absinthe Bar – plus, …
Understanding Technical vs. Logical Vulnerabilities
On Nov, 11, 2003, the chess-playing machine X3D Fritz tied grandmaster and former world champion Garry Kasparov in a four-game match. In this classic contest of Man vs. …
HNS Podcast: Nortel’s Approach To Security
Welcome to the first Help Net Security Podcast. We are going to be focusing on the enterprise and informing you on new products and technologies. While at the Infosecurity …
How Companies Can Manage Strong Authentication Intelligently
According to the latest figures from the Department of Trade & Industry, eight out of ten UK firms offer its employees the option of working from home for at least part …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?