Please turn on your JavaScript for this page to function normally.
E-mail Security

In this 6:49 minutes long audio learning session, Joseph Zacharias, Managing Director at Kerio Technologies UK, discusses the major aspects of e-mail security, including viral …

OpenVPN 101: introduction to OpenVPN

This document will introduce OpenVPN as a free, secure and easy to use and configure SSLbased VPN solution. The document will present some simple (and verified) …

A Practical Implementation of a Real-time Intrusion Prevention System for Commercial Enterprise Databases

Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural …

Executive Conversation: Attacking the Phishing Threat – What Every Company Needs to Know

By now just about every person with an email inbox has been exposed to a phishing scam. Spoofs are showing up with alarming frequency and to make matters worse, criminals have …

Secure Your Workplace When Going On Vacation

In the northern hemisphere, the long-awaited summer holidays are just around the corner for many workers. The longer days and warmer weather will see many people taking a …

Collaboration in a Secure Development Process, Part 1

You have to ask yourself: why is there so much bad code? How many times have you heard the statement to the effect of: “if only the developers had built these …

VPNs (Virtual Private Nightmares)

Here’s a question: What’s the number 1 vector for security outbreaks today? Given the title of the article we hope you answered Virtual Private Networks (VPNs). …

Five Tips on Protecting Your Business Against Spam

In this 4:29 minutes long audio learning session, Warren Sealey, SME Security Manager at Message Labs, discusses the ever growing spam problem, talks about the positive …

Web Security Threat Classification

For many organizations, web sites serve as mission critical systems that must operate smoothly to process millions of dollars in daily online transactions. However, the actual …

A Database Encryption Solution That Is Protecting Against External And Internal Threats, And Meeting Regulatory Requirements

Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing interest in the problem of building accurate data …

Best Practices For Securing Your WLAN

The steady growth of Wi-Fi in the enterprise demands that corporate IT teams learn and adopt new security methodologies tailored to the unique requirements and weaknesses of …

Encryption Applied

In this 8:13 minutes long audio learning session, Alex van Someren, Chief Executive Officer at nCipher, talks about the process of encryption, the difference between symmetric …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools