Expert analysis
Details on Microsoft Identity Lifecycle Manager 2007
Peter Houston, the Senior Director for Identity and Access Management at Microsoft speaks about Microsoft Identity Lifecycle Manager 2007 and provides details about how this …
Wardriving in London 2007
Conducting regular research into WiFi networks and wireless protocols can help us gain a better understanding of the true state of affairs in this area. When possible, we try …
Survey Reveals Scandal of Snooping IT Staff
Whilst you sit at your desk working innocently away, little do you realize that one in three of your IT work colleagues are snooping through company systems, peeking at …
Lessons From a Honeynet That Attracted 700,000 Attacks
Over the 5 year lifetime of the IrishHoneynet, we have witnessed hundreds of thousands of scans, probes and attacks against the servers that comprise the network. Our …
How To Prepare For a Security Information and Event Management Deployment
Fail to prepare, as the saying goes, and you prepare to fail. This maxim certainly applies to most large-scale IT projects, and doubly so for Security Information and Event …
Stephen Northcutt on Security Certification and the SANS Top 20
Stephen Northcutt, the CEO of the SANS Institute, provides us with an overview of SANS activities, the Internet Storm Center, the SANS Top 20 and the evolution of the IT …
Today’s Biggest IT Security Menace and 6 Ways to Fight It
What is today’s biggest IT security threat? IT itself, according to recent reports from IDC and Carnegie Mellon/DoD. To begin with, IDC research finds that enterprise …
The Future of Spam
In the 1930s, the US psychologist Abraham Maslow formulated a theory that according to which, everybody has a series of basic needs that must be covered in a certain order, so …
Web 2.0 Threats and Risks for Financial Services
Web 2.0 technologies are gaining momentum worldwide, penetrating in all industries as enterprise 2.0 applications. Financial services are no exception to this trend. One of …
New Security Features in Internet Explorer 7
Markellos Diorinos from the IE team at Microsoft introduces the new security features in IE 7 and speaks about extended validation SSL certificates. He also covers the …
Microsoft Information Protection
Keith Brintzenhofe, the Manager of the Information Protection Platform Team at Microsoft, discusses their approach to information protection. He talks about new security …
Hacking the Cisco NAC – NACATTACK
At Black Hat Europe we met Dror-John Roecher and Michael Thumann who were able to hack the Cisco NAC solution by exploiting a fundamental design flaw (PDF). In this video they …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act