Expert analysis
Security Risks Associated With Portable Storage Devices
It seems that nearly every new electronic device on the market today comes equipped with data storage and transfer capabilities. From USB sticks to smart phones, MP3 players …
Securing Storage: Complete Data Erasure on Storage Systems
Out of sight, out of mind. When storage systems are upgraded, retired due to proactive maintenance, reach the end of their lease, or are repurposed or resold, companies often …
The Key to Compliance
In the wake of the Enron and Worldcom accounting scandals, the regulations an enterprise implements to ensure its integrity are open to increasing scrutiny. This has given …
How well do you know your partner?
For those of you who follow the news, you may have read the recent story of spy software discovered at some of Israel’s leading companies which reads just like the spy …
An Introduction to Securing Linux with Apache, ProFTPd and Samba
While the vast majority of Linux users are hard-core techies, some may be using Linux because they want to try something new, are interested in the technology, or simply …
Gerhard Eschelbeck on the Common Vulnerability Scoring System (CVSS)
Gerhard Eschelbeck is the CTO & Vice President of engineering of Qualys. In this audio Mr. Eschelbeck discusses the Common Vulnerability Scoring System (CVSS), the …
Does Firefox Really Provide More Security Than Internet Explorer?
Introduction Internet Explorer is a graphical web browser made by Microsoft and comes integrated with Windows. Even though it’s by far the most widely used browser, …
Domain Footprinting for Web Applications and Web Services
A wide array of services, from banking and finance transactions to auctions and ticket reservations, are being offered to customers online. This means that an Internet …
Web Application Defense At The Gates – Leveraging IHttpModule
Web applications are vulnerable to many attacks, mainly due to poor input validation at the source code level. Firewalls can block access to ports but once a web application …
Securing Optical Networks With Quantum Cryptography
In a world where the reliance on electronic data transmission and processing is becoming every day more prevalent, it is of critical importance for organizations to guarantee …
Qualys CTO on SANS Top 20 Quaterly Update
More than 600 new Internet security vulnerabilities were discovered during the first quarter of 2005, according to the SANS Institute and a team of experts from industry and …
Infosecurity Europe 2005 – First Issue of (IN)SECURE Magazine Available for Download
During the second day of Infosecurity Europe 2005 Conference, HNS announced the first issue of (IN)SECURE Magazine, a freely available, freely distributable digital security …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?