Expert analysis
PCI Data Security Standard Calls for Next-Generation Network Security
The widespread use of credit cards for virtually all of our financial transactions has increased exponentially with the rapid adoption of e-commerce throughout the worldwide …
The Truth About Patching
As arguments continue to rage about whether an agent-based or agentless patching technique is more effective, see which side you’re on after we dispel five common myths. …
Introduction to the Windows Management Instrumentation Command-line (WMIC)
It’s quite possible you’ve never heard of the Windows Management Instrumentation Command-line (WMIC), but this well kept secret command-line tool is immensely …
E-Mail Content Security: Filtering Out the Hype
E-mail is at risk – vulnerable to external attack from viruses, spam, spyware and phishing technologies. And vulnerable to abuse from within, which could result in: …
Introducing Stealth Malware Taxonomy
At the beginning of this year, at Black Hat Federal Conference, I proposed a simple taxonomy that could be used to classify stealth malware according to how it interacts with …
What Are The Most Common Causes Of Security Breaches?
Historically, the approach to enterprise security has been to make the fortress bigger and stronger – to install more products, and write more policies. Yet despite …
7 Steps to Securing USB Drives
Personal storage devices such as USB flash drives are more powerful than ever and have become ubiquitous in the enterprise environment. Originally designed for consumer use, …
Storing and Protecting Data
Given massive data growth across all industries, Information Lifecycle Management or ILM has become accepted as a critical business goal many organisations hope to achieve …
Top 10 Ajax Security Holes and Driving Factors
One of the central ingredients of Web 2.0 applications is Ajax encompassed by JavaScripts. This phase of evolution has transformed the Web into a superplatform. Not …
WAN Acceleration: Best Practices for Preserving Security
The centralization of branch office servers and storage enables enterprises to more effectively manage and secure critical business information. By moving servers out of …
Super Power Password Protection – Watching You Watching Me
Not a day goes by without some story hitting the wires about yet another piece of confidential information appearing in somebody’s inbox. Confidential emails, files, …
Data Storage Security – Quo Vadis
Today, industry trends are forcing security in the data center to be re-thought. In particular, the trend towards consolidation results in increasingly centralised data …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act