Expert analysis
Computers, Networks and Theft
Computers have become an integral part of our lives. Every day more and more users and organizations use them to store data which is a type of property. Although most people …
Interview with Marc Vaillant, CEO of Criston
Since the start of his career, Marc Vaillant has always worked in the high-tech sector, holding positions in companies of various sizes. Before joining Criston, he was Chief …
Data Protection Management: Shedding Light on Complex Infrastructures
Data protection strategies have become significantly more complex in recent years. Companies that used to rely on a single-vendor tape backup solution are now using disk-based …
Top 10 Web 2.0 Attack Vectors
Web 2.0 is the novel term coined for new generation Web applications. start.com, Google maps, Writely and MySpace.com are a few examples. The shifting technological landscape …
A New Approach To Data Protection And Management
In the struggle to ensure data protection, reduce backup windows, and manage costs – both capital and operational – IT managers face increasing challenges. …
Top 5 Tips to NOT Get Hacked Online
“Oh my God, I’m never doing anything on-line again!,” is a common reaction to one of my web application hacking presentations. Recently I’ve been …
Raman Amplification in Storage Area Networking
Enterprise requirements for business-continuity and disaster-recovery solutions continue to grow more demanding. An example can be found in the drive to lengthen the distances …
Using Pict Encrypt for steganography purposes on Mac OS X
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt …
Constructing Secure Storage Area Networks
Increasingly concerned about the availability of their business data, many enterprises over the last five years have implemented sophisticated storage area networks (SANs). …
Interview with Vladimir Katalov, CEO of ElcomSoft
Vladimir Katalov is working in ElcomSoft from the very beginning. He created the first program the password recovery software line has started from: Advanced ZIP Password …
The Changing Face of Disaster Recovery
Disaster recovery and remote office replication are increasingly becoming top-of-mind issues for IT professionals. It is ironic that tape, the most operationally unpredictable …
Network Attacks: Analysis of Department of Justice Prosecutions 1999 – 2006
A landmark study on Department of Justice network crime prosecutions reveals most attacks used stolen IDs and passwords, resulting in far greater damages to affected …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act