Help Net Security
Diversinet Buys Boston-Based Caradas, Expands Push Into U.S.
Strengthens secure wireless offerings into global finance, government sectors TORONTO, September 9, 2003 – Diversinet Corp. (OTCBB: DVNTF) today announced it has …
Utimaco Lands Anchor Financial Investor and Raises Euro 12.1 Million
Investcorp leads Euro 12.1 million raise to strengthen balance sheet and provide solid basis for growth Oberursel, Germany, September 9, 2003 – Utimaco Safeware, a …
Trend Micro Spam Prevention Service Continues to Block Spam at the Internet Gateway Despite Spam’s Virus-Like Behavior
Enhanced features reduce false positives and give more administrative control over identification of unwanted email Cupertino, California – September 8, 2003 – …
Trend Micro InterScan Web Security Suite Brings High Performance Gateway Protection for Enterprise Customers
First Dedicated HTTP/FTP Security Solution Now Available for Microsoft(tm) Windows(tm) and Solaris(tm) Platforms Cupertino, California – September 8, 2003 – Trend …
Information Security Checklist
Today’s heightened awareness of the need to secure IT infrastructures and protect mission critical data is leading more and more organizations to reevaluate their …
Neoteris Announces Extension Of Access Series To Address Industry Demand For Secure Wireless Mobile Access
Neoteris SSL Access Products Deliver Industry’s Only Truly Clientless Support for Broad Range of Mobile Wireless Applications and Devices, Including Sony …
Blue Coat Introduces ProxySG – Secure Proxy Appliances Control User Communications Over the Web
SUNNYVALE, Calif., Sep. 8 /PRNewswire-FirstCall/ — Blue Coat(TM) Systems, Inc. (Nasdaq: BCSI) today announced the availability of ProxySG(TM), a family of secure proxy …
Blue Coat Integrates SurfControl Filtering Onto Secure Proxy Appliance
SUNNYVALE, Calif., Sep. 8 /PRNewswire-FirstCall/ — Blue Coat(TM) Systems, Inc. (Nasdaq: BCSI) today announced the integration of SurfControl’s (London: SRF, Nasdaq …
“Kerberos: The Definitive Guide” Puts the Network Watchdog On the Prowl
Sebastopol, CA–In Greek mythology, Kerberos (aka Cerberus) was the hound of Hades–a vicious, three-headed dog with a mane of snakes and lion’s claws that …
Protecting Databases
One of the more recent evolutions in network security has been the movement away from protecting the perimeter of the network to protecting data at the source. The reason …
Weekly Virus Report – Blaster.F, Mapson.D, Darby.A, Apdoor.B, Daol.A and Surfbar
Blaster.F, which only infects Windows 2003/XP/2000/NT computers, is a worm that exploits the ‘Buffer Overrun in RPC Interface’ vulnerability to spread to as many …
Prison for computer crime
The Justice Ministers of the 15 Member States of the European Union have decided to modify their country laws, with the aim of including prison sentences for the authors of …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments