Features

IT Forensics

Comment: New Approaches Needed for Database Security and Advanced Network Threats Comment: New Approaches Needed for Database Security and Advanced Network Threats

Today’s advanced threats require a smarter approach to database security that extends beyond detection and monitoring the usual attack surfaces and SQL injection techniques. This is the view from NetCitadel’s Duane Kuroda
17 April 2014

Anti-Virus: Little More Than a Team Player Anti-Virus: Little More Than a Team Player

Anti-virus is just one small part of the holistic security strategy, argues Ryan W Smith
28 March 2014

Anti-virus Lives to Fight Another Day Anti-virus Lives to Fight Another Day

Anti-virus remains a cornerstone of any security strategy, finds David Harley, as he acknowledges the contributions of anti-malware researchers
28 March 2014

Comment: APT Detection – Closing the Gaping Hole Comment: APT Detection – Closing the Gaping Hole

Technology solutions to combat advanced persistent threats are in no short supply, but actually detecting these targeted infiltrations remains difficult. Avishai Ziv of LynuxWorks examines the reasons, and how to overcome the problem
24 March 2014

Interview: Brian Honan Interview: Brian Honan

Brian Honan is a man who wears many hats, but all of them are white. Eleanor Dallaway travels to Dublin to spend an afternoon with one of the information security industry’s favorite treasures
11 March 2014

Hacker Training 101 Hacker Training 101

How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…
25 February 2014

Comment: Skills Are More Important than Certifications Comment: Skills Are More Important than Certifications

Real-world experiences and internal knowledge transfer increase the proficiency of IT security teams, says Hamlin Tallent of Sentek Global
15 January 2014

The Hack Back Controversy The Hack Back Controversy

An increasing amount of lip service is being paid to ‘hack back’ initiatives. While rules and levels of acceptance vary according to hack back entity – military, law enforcement and private industry – Kevin Townsend finds that perhaps the largest variance of opinion comes down to geography as he asks the question: Should hack back be a legal right for those under cyber-attack?
06 January 2014

Through Dark Clouds, a Ray of Light Through Dark Clouds, a Ray of Light

Increasingly complex threats lead Raj Samani to conclude that the state of data security is worse off than it was a decade ago – but not all is lost, as he explains
23 December 2013

Evolution of the Cybersecurity Professional Evolution of the Cybersecurity Professional

Hord Tipton pays tribute to the data security victories over the last 10 years, but acknowledges it’s a never-ending struggle replete with immense challenges
23 December 2013

Showing 1 - 10 of 119 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×