Please turn on your JavaScript for this page to function normally.
Audio Interview with Greg Hoglund and Gary McGraw, Authors of “Exploiting Software: How to Break Code”

The authors of the acclaimed “Exploiting Software: How to Break Code” voice their opinion on close source vs. open source security, the most ridiculous mistakes …

NetScreen Positioned in the Leader Quadrant in SSL VPN Magic Quadrant

SUNNYVALE, Calif., April 14, 2004 – NetScreen Technologies, Inc. (Nasdaq: NSCN) today announced it has been recognized in a recently released SSL VPN market research …

Sanctum Hits Record Numbers in Q1 2004, Extending Lead in Application Security Market with 95 Percent Revenue Growth

SANTA CLARA, CALIF.-April 12, 2004-Sanctum, Inc., the established leader in automated Web application security firewall and testing software, today announced its best quarter …

Mail Scanning With Exim And The Exiscan ACL

With all the spam and viruses circulating the Internet these days, any network admin worth his or her salt will have appropriate filters in place to prevent these irritants …

Registration Opens for the 2004 O’Reilly Open Source Convention

Sebastopol, CA–O’Reilly & Associates founder Tim O’Reilly is fond of quoting an Athenian in ancient Greece who said, “The difference between a man …

Spectorsoft Corporation Has Announced That it Has Begun Shipment of Spector Corporate Network Edition

The result provides businesses with the most advanced monitoring software suite ever offered. Now, at the touch of a button, Spector CNE can be remotely configured and …

GFI Releases a Major Upgrade Of Its Acclaimed Network Security Scanner

London, UK, 12 April 2004 – GFI today announced the release of GFI LANguard Network Security Scanner (N.S.S.) 5, a major upgrade of its popular network security scanner. …

O’Reilly Releases “Windows Server Hacks”

Sebastopol, CA–One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity of its administration. The easy-to-use GUI, …

O’Reilly Releases “Network Security Assessment”

Sebastopol, CA–An increasingly popular approach to network security is to think like the bad guys: by understanding the methods and motivations of those who attempt to …

Weekly Report on Viruses and Intrusions – Bugbear.C, Variants S and T of Netsky and Sober.F

Bugbear.C mails itself out to all the addresses it finds in the affected computer’s Outlook Address Book and in files with the following extensions: ODS, MMF, NCH, MBX, …

Netsky-Q Worm Preparing To Blast Websites Off The Net

The Netsky-Q worm (W32/Netsky-Q) is set to launch distributed denial of service attacks against a number of websites as infected computers pass midnight tonight. The worm …

SecureInfo’s RMS Security Compliance Solution First-to-Market with Final Draft of NIST Special Publication 800-37 for Federal Civilian Agencies

SAN ANTONIO, TEXAS – April 6, 2004, SecureInfo Corporation, a recognized leader in delivering enterprise information security solutions, announced today that RMS(tm) …

Don't miss

Cybersecurity news