Expert analysis
Countering Cyber Terrorism
Still using that tired and worn out password to log onto your PC? Is your mother’s maiden name still the main prompt you use to log on and check your credit card …
Revealing The Myths About Network Security
Many people and businesses unknowingly leave their private information readily available to hackers because they subscribe to some common myths about computer and network …
Philip Zimmermann releases Zfone, a product that secures VoIP
Zimmermann thinks Zfone is better than the other approaches to secure VoIP, because it achieves security without reliance on a PKI, key certification, trust models, …
The 7 myths about protecting your web applications
Today Web Applications are delivering critical information to a growing number of employees and partners. Most organizations have already invested heavily in network security …
Interview with Marc Shinbrood, President and CEO, Breach Security
Marc Shinbrood has more than 30 years of experience in information technology with the last 10 years dedicated specifically to the computer security industry. What do you see …
Combating Identity Theft
Identity theft is the major security concern facing organisations today. Indeed, for the banking industry, it is the number one security priority for 2006. In a recent survey …
Communicating with Confidence: Choosing a Secure, Flexible Working Solution
In today’s mobile, highly-networked world, workers depend on access to their office networks to retrieve data about their customers, colleagues and business projects. …
Managing the Impact of Academic Research on Industry/Government: Conflict or Partnership?
In the world of Information Security, there is great potential for conflict between the research aims of academics on the one hand, and the interests of industry and …
Recover Passwords Using the Power of Multiple Computers
Elcomsoft Distributed Password Recovery offers administrators a comprehensive solution for recovering passwords to MS-Office documents when employees forget their passwords, …
Coping with A Major Security Breach? What’s your Contingency Plan?
Legal pressures, not to mention your moral obligation to assist unwitting victims, means that you should never delay when disclosing IT security incidents. In November 2005 a …
Experts Comment On The Top Security Threats In 2006
At the Infosecurity Europe 2006 Press Conference a panel of speakers from MessageLabs, Centennial Software, (ISC)2, Black Spider, Juniper Networks and Insight Consulting …
Microsoft Talks About Security Developments
Microsoft realized that phishing, pharming, botnets and rootkits show that attacks are becoming more sophisticated. This situation makes traditional defenses to be inadequate …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring