Please turn on your JavaScript for this page to function normally.
Stolen Voices – The Challenge of Securing VoIP

Voice over IP (VoIP) is rapidly becoming a pervasive technology as businesses embrace cost savings on calls whilst enjoying advanced communications applications sitting within …

Malware Comes Of Age: The Arrival Of The True Computer Parasite

Even though malware has been a recognised threat within the general IT community for well over 15 years, it is effectively a bigger problem now than it has ever been before. …

Why Due Diligence as a Defense is Not Enough

Corporate executives love two words, “Due Diligence”. Unfortunately, this is only half of the required formula for meeting the requirements under “Standard …

Freedom From Security

Enterprises are no longer restricted to the networked systems bounded by the building in which the company is housed. Modern enterprises span the globe and employees can …

Writing an Incident Handling and Recovery Plan

Introduction While many websites and papers discuss incident handling and incident response plans, aside from RFC 2350 very few of these lay out exactly what an actual plan …

Combating “Cardholder Not Present” Fraud

Of the security issues facing banks everywhere, prevention of card fraud has always been a high priority, and is set to grow even further in importance. The level of card …

The Rise Of The Customised Security Attack

The email security landscape is constantly changing, and one of the biggest shifts during the past twelve months has been the dominance of convergence – the practice of …

The Network Poltergeist

The IT industry isn’t as boring and technically obsessed as many outsiders believe. Viruses and malicious hacker threats in particular have been increasingly …

Strong Authentication

In this video Mr. Andrew Nash, Director of Technology, Office of the CTO, RSA Security, talks about strong authentication and how identity has become an increasing concern, …

Telecom Fraud: The Cost of Doing Nothing Just Went Up

Emotive terms such as “cyber attack” and “cyber-terrorism” are always certain to generate plenty of media excitement, with science-fiction visions of …

Automated Patching: An Easier Approach to Managing Your Network Security

Patch management is an essential administration task within today’s busy IT networks with the constant threat of new security bugs. Some companies will wait for an …

Providing Database Encryption as a Scalable Enterprise Infrastructure Service – Protecting Against External and Internal Threats

As databases become networked in more complex multi-tiered applications, their vulnerability to external attack grows. We address scalability as a particularly vital problem …

Don't miss

Cybersecurity news