Berislav Kucan
Security Designs of SSL VPNs
During the Infosecurity Europe 2004 show, we caught up with William Orme, Senior Technical Consultant at Whale Communications, and talked to him about SSL VPNs. In this audio …
WarDriving: Drive, Detect, Defend, A Guide to Wireless Security
Wardriving is extremely important for the state of wireless security, as it shows how many unprotected WLANs are out there and is therefore directly influencing wireless …
The Certification of SSL VPNs
During the Infosecurity Europe 2004, we caught up with Brian Monkman, Technology Programs Manager at ICSA Labs, and talked to him about SSL VPNs. In this audio session, Mr. …
Biometrics for Network Security
With all the problems related to using simple password-based authentication methods, biometrics surely has major "pros" for its implementation in enterprise networks. Can this …
802.11 Wireless Networks: The Definitive Guide
Despite providing a wealth of extensive in-depth technical pieces of information, which vary from cryptic shorts to descriptions of specific frame parts, the book is very easy …
E-mail Security
In this 6:49 minutes long audio learning session, Joseph Zacharias, Managing Director at Kerio Technologies UK, discusses the major aspects of e-mail security, including viral …
Five Tips on Protecting Your Business Against Spam
In this 4:29 minutes long audio learning session, Warren Sealey, SME Security Manager at Message Labs, discusses the ever growing spam problem, talks about the positive …
Encryption Applied
In this 8:13 minutes long audio learning session, Alex van Someren, Chief Executive Officer at nCipher, talks about the process of encryption, the difference between symmetric …
Digital Certificates Explained
In this 3:43 minutes long audio learning session, Dr. Phillip Hallam-Baker, Principle Scientist and Web Services Security Architect at Verisign, talks about Public Key …
SQL Injection Attacks
SQL injection is a technique for exploiting web applications that use client-supplied data in SQL queries without stripping potentially harmful characters first. Despite being …
HackNotes Network Security Portable Reference
This book is perfectly suited for two different types of readers: those who are working within the Information Security field and need to catch up with some of the most common …
The Benefits of SSL VPNs
Secure Sockets Layer (SSL) Virtual Private Networks are quickly gaining popularity as serious contenders in the remote-access marketplace. Analysts predict that products based …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments