Please turn on your JavaScript for this page to function normally.
Countering cyber war

For many, the term cyber war conjures up images of deadly, malicious programmes causing computer systems to freeze, weapon systems to fail, thwarting vaunted technological …

Dealing with External Computer Security Incidents

Dealing with computer security incidents is extremely difficult. There are many ways that incidents can occur and many types of impact they can have on an organization. There …

netForensics Unveils the Next Generation of Security Information Management

Advanced SIM Offering Features State-of-the-Art Visualization and Risk Assessment Capabilities WASHINGTON, Oct. 23 /PRNewswire/ — netForensics, Inc., the recognized …

F-Secure Receives World’s First Security Certificate For Windows Powered Mobile Platforms

F-Secure Corporation is the first company in the world to receive United States government validation from National Institute of Standards and Technology for cryptographic …

Cyberguard Firewalls To Protect Major Mideast Telecom

Saudi Telecom Company – Kingdom’s Only Communications Provider – Selects CyberGuard Firewalls To Secure Network Infrastructure Ft. Lauderdale, Fla., and …

Datakey Announces Third Quarter Results

MINNEAPOLIS, Oct. 22, 2002 – Datakey Inc. (Nasdaq: DKEY; www.datakey.com), a trusted developer of smart card solutions for securing e-business, today reported revenue of …

Cisco Systems to Acquire Psionic Software

Software Reduces Network Security False Alarms, Improving Business Productivity and Lowering Costs SAN JOSE, Calif., Oct. 22, 2002 — Cisco Systems, Inc., today announced …

Baltimore Is First To Remove The Cost and Complexity of PKI Security

Baltimore launches Trusted Business Suite putting the emphasis on business applications. LONDON, October 22, 2002: Baltimore Technologies (London:BLM), a leading e-security …

Open Source Digital Forensics Tools: The Legal Argument

This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a tool must be reliable and …

Can you trust your computer?

Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call “trusted …

DBCC SHOWTABLEAFFINITY buffer overrun

Martin Rakhmanoff wrote this article to (better) document the process of finding and exploiting buffer overrun bugs. Provided sample code is written for Microsoft SQL Server …

Snapgear Launches Into Controller Market

Secure industrial control applications made possible with Snap Gear security expertise. SALT LAKE CITY, Utah – October 21st, 2002 – SnapGear Inc., a leading …

Don't miss

Cybersecurity news