Expert analysis
Trike – A Conceptual Framework for Threat Modeling
Trike is a unified conceptual framework for security auditing from a risk management perspective through the generation of threat models in a reliable, repeatable manner. A …
New Car Safe for your IT Equipment
SecureITsafe Ltd have just announced the launch of a totally portable steel case that can be mounted in the boot of any car using the existing vehicle anchorages. The high …
Prepare For Disasters That Could Bring Your Business To A Halt
Many companies associate disaster recovery with catastrophic events – earthquakes, floods, fires and other natural or man-made disasters that make data recovery from …
Data Breaches: Turn Back the Tide
Executive Summary Despite the hundreds of millions of dollars that organizations have invested in information security technology to secure their critical business-technology …
Risks and Threats To Storage Area Networks
Introduction Every business faces risk as long as they have something of value. The more valuable the assets of the company are, the more risk they face. Data value increases …
Laptop Theft – An Insider’s Guide To Not Becoming Another Statistic
When laptops were first available, they were treated with great care and attention. To be given a laptop by your company marked you out as someone special. Today, the laptop …
Encryption – The Missing Defence Tool In Many Companies’ Security Policy
Over the last few years, protection against external attacks has been the main focus of information security policies and purchases but this has caused the other aspects of …
Browser Identification For Web Applications
Browser Identification is not a new concept. With the focus having shifted to desktops from networks and servers, a topic such as remote browser identification needs to be …
Snort on Window Server 2003
The setup the author is discussing is running Snort 2.3.3 on Windows Server 2003 with PHP5 and SQL 2000 SP4. All other components are also the latest available for public use. …
Security Risks Associated With Portable Storage Devices
It seems that nearly every new electronic device on the market today comes equipped with data storage and transfer capabilities. From USB sticks to smart phones, MP3 players …
Securing Storage: Complete Data Erasure on Storage Systems
Out of sight, out of mind. When storage systems are upgraded, retired due to proactive maintenance, reach the end of their lease, or are repurposed or resold, companies often …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act