Help Net Security
Countering cyber war
For many, the term cyber war conjures up images of deadly, malicious programmes causing computer systems to freeze, weapon systems to fail, thwarting vaunted technological …
Dealing with External Computer Security Incidents
Dealing with computer security incidents is extremely difficult. There are many ways that incidents can occur and many types of impact they can have on an organization. There …
netForensics Unveils the Next Generation of Security Information Management
Advanced SIM Offering Features State-of-the-Art Visualization and Risk Assessment Capabilities WASHINGTON, Oct. 23 /PRNewswire/ — netForensics, Inc., the recognized …
F-Secure Receives World’s First Security Certificate For Windows Powered Mobile Platforms
F-Secure Corporation is the first company in the world to receive United States government validation from National Institute of Standards and Technology for cryptographic …
Cyberguard Firewalls To Protect Major Mideast Telecom
Saudi Telecom Company – Kingdom’s Only Communications Provider – Selects CyberGuard Firewalls To Secure Network Infrastructure Ft. Lauderdale, Fla., and …
Datakey Announces Third Quarter Results
MINNEAPOLIS, Oct. 22, 2002 – Datakey Inc. (Nasdaq: DKEY; www.datakey.com), a trusted developer of smart card solutions for securing e-business, today reported revenue of …
Cisco Systems to Acquire Psionic Software
Software Reduces Network Security False Alarms, Improving Business Productivity and Lowering Costs SAN JOSE, Calif., Oct. 22, 2002 — Cisco Systems, Inc., today announced …
Baltimore Is First To Remove The Cost and Complexity of PKI Security
Baltimore launches Trusted Business Suite putting the emphasis on business applications. LONDON, October 22, 2002: Baltimore Technologies (London:BLM), a leading e-security …
Open Source Digital Forensics Tools: The Legal Argument
This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a tool must be reliable and …
Can you trust your computer?
Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call “trusted …
DBCC SHOWTABLEAFFINITY buffer overrun
Martin Rakhmanoff wrote this article to (better) document the process of finding and exploiting buffer overrun bugs. Provided sample code is written for Microsoft SQL Server …
Snapgear Launches Into Controller Market
Secure industrial control applications made possible with Snap Gear security expertise. SALT LAKE CITY, Utah – October 21st, 2002 – SnapGear Inc., a leading …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments