Expert analysis
Interview with Paul Zimski, Product Strategy Manager For Harris Corporation’s STAT Computer Security Unit
Paul Zimski, CISSP, is the product strategy manager for Harris Corporation’s STAT computer security unit, which provides network security solutions backed by decades of …
The Issue of Compliance – It’s Here and It’s Expanding!
By now, most high-tech conferences have devoted at least one 30-minute session to the topic of Sarbanes-Oxley (aka “Sarbox”). Complexity of language aside, Sarbox …
Large Enterprise Application Security
Large enterprises of a thousand people or more often have distinctly different information security architectures than smaller companies. However, typically they treat their …
The Future of Phishing
This article examines how attackers are likely to respond to the current move towards 2-factor authentication as a defence against phishing scams, and describes an alternative …
Using the PuTTY SSH Client on Nokia Series 60 Phones
While doing a regular checkup on Slashdot, I’ve came across a new product announcement concerning PuTTY being ported to Nokia Series 60. If you are not familiar with …
Increasing Volumes Of Spam A Growing Concern For UK Business
For around half of British businesses the increasing volumes of unsolicited emails or spam they receive is a growing concern and in some cases has reached unacceptable levels. …
Whose Site is it Anyway?
Despite the rapid increase in online commerce, it is estimated that some 85% of transactions are still cancelled at the final ‘confirm and buy’ page. While some of …
The Layered Approach to Security is Dead… Long Live Layered Security
Life isn’t the same as it used to be, the good old days of leaving your door unlocked are gone, never to return. Business isn’t the same either. IT has brought …
VoIP – Vulnerability over Internet Protocol
During the past few years the two most significant focuses for remaining IT budget have been security and cost saving systems capable of demonstrating rapid ROI. But in almost …
Mitigating the Complexities of Security Management
Securing your enterprise IT infrastructure can be a complex task. If your computing environment is like most, it is heterogeneous and contains a number of security products …
Creating Secure Backups With GnuPG
I’m working for a relatively large Internet Presence Provider (IPP) that servs about 4000 clients from about 30 countries worldwide. Besides a chunk of e-mails to our …
Patch Management
2003 has been the year of the Worm – worms such as Blaster, Slammer, Sobig (various forms) and Code Red, which can all be traced directly to exploitation of unpatched …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act