Paul Rubens Avatar
  • 7 IPv6 Security Risks

    The rise of IPv6 could give you some severe security headaches — even if you have no current plans to implement the new networking protocol. That was the stark warning issued by Eric Vyncke, a security expert from Cisco, talking at the RSA Conference Europe in London this month. On the face of it, there […]

  • How Does Biometric Authentication Work?

    Have passwords outlived their usefulness? Take a look at some of the weak passwords exposed in website breaches this year, and judge for yourself. The frequent usage of weak passwords such as “changeme,” “123abc,” and “Pa$$w0rd” (real-life examples uncovered in the recent breach and defacement of a security software vendor’s website) are a strong indicator […]

  • Five Signs Your Website is the Target of an Automated Attack

    Hackers love automated SQL Injection and Remote File Inclusion attack tools. Using software such as sqlmap, Havij, or NetSparker, finding and exploiting website vulnerabilities is fast and easy even for unskilled attackers. Hackers favor automated tools for three key reasons. First and foremost, these toools require very little skill to use, and are often freely […]

  • Top 3 Insecure Password Management Practices

    Here’s a dirty little secret about passwords in the enterprise: In many organizations, IT administrators sometimes follow insecure password management practices because it’s often the easiest way to get the job done. The root problem is one of complexity. Managing passwords for large numbers of privileged accounts – and ensuring that the people, applications, and […]

  • How to Run Your Own Certificate Authority

      Digital certificates lie at the heart of Public Key Infrastructure (PKI) security technologies such as encrypted email, document signing, VPN access, server SSL authentication, and software code signing. Certificates are a vital part of PKI because they provide a means to establish the ownership of an encryption key. If you have someone else’s public […]

  • How to Securely Delete Data from Hard Drives

    What happens to the confidential data on hard drives and other storage media in your organization when you replace them? It’s a vital question to ask – because unless the data is completely erased, there’s a good chance that it could come back to haunt you. As a quick Google search will confirm, there’s no […]

  • Full Disk Encryption Buyer’s Guide

    Full disk encryption – also known as whole encryption – is the most effective way to prevent confidential data being taken from a laptop that has been lost, stolen or left unattended in a hotel room. How Full Disk Encryption Works FDE works by encrypting a system’s entire hard drive – all the confidential data […]

  • Review: McAfee Endpoint Protection Suite

    McAfee’s Endpoint Protection Suite (EPS) relies on standard anti-virus technologies to protect Windows-based desktops, laptops, and servers. It is aimed at small to mid-sized and larger enterprises with between 100 and 1000 users, but can be used in even smaller organizations or scale to many thousands of users. Signature-based virus protection is an area in […]

  • 4 Steps to Securing Mobile Devices and Apps in the Workplace

    It’s an unstoppable trend: Employees are bringing their own iPhones, iPads, and Android devices to work and using them for business purposes. While that may be great for productivity, the influx of personal smartphones and tablets in the workplace can pose a significant risk to your organization’s security if you don’t have a strategy for […]

  • Trend Micro Endpoint Security Review

    Trend Micro is one of the “big four” business endpoint security vendors, along with Symantec, McAfee and Kaspersky. Its offering comes in two versions: a standard one, called OfficeScan Standalone, and a more comprehensive suite called Enterprise Security for Endpoints. OfficeScan Standalone offers protection for Windows-based endpoints and Windows, Linux and Netware servers, while Enterprise […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis