Help Net Security
Check Point Software Unveils New SmartLSM
First Solution to Enable Simple VPN/Security Deployment and Management for Up to One Thousand Franchise Locations REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point …
Research Firm Recognizes Check Point as VPN Market Leader
Leader Position Based on Ability to Execute and Completeness of Vision REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point Software Technologies Ltd. (Nasdaq: CHKP), the …
Check Point Software And Internet Security Systems Secure Networld+Interop and COMDEX Event Network
Check Point and ISS Provide Integrated Security Framework with Best-of-Breed Technology for Largest Short-Term Network REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point …
Baltimore Technologies Plc Announces Restructuring Close to Completion and Half-Year Results in Line with Expectations for 6 Months Ended June 30 2002
London, UK – September 10, 2002 – Baltimore Technologies (London:BLM), (“Baltimore”) today announced its interim results for the six months ended 30 …
The Weakest Link in Disaster Recovery
Much of the focus of disaster recovery planning is on creating redundant data sites and backup tapes. Very often, a crucial component is overlooked: that of keeping current …
Ositis Ships SiteStripper
SiteStripper Increases Productivity, Manages Resources and Enforces Policies to Prevent Employees from Accessing Prohibited Websites Pleasanton, CA — September 6, 2002 …
Trend Micro to Join Nikkei Stock Average
Tokyo, Japan – September 9, 2002 – Trend Micro Inc. (TSE: 4704, Nasdaq:TMIC), a leading provider of antivirus and Internet content security software and services …
SSH Communications Security Achieves Opsec Certification From Check Point Software
SSH Certifier Integrates with Industry’s Most Recognized Security Framework HELSINKI, FINLAND and PALO ALTO, Calif. – Date 10, 2002 – SSH Communications …
How To Ensure Security When The Business Itself Is Confidential, Personal Information
TruSecure and American Tenant Screen Present a Free Webinar on Security for Information Businesses Smaller businesses face the same information security challenges as Global …
Multitool Linux: Practical Uses for Open Source Software
This book is intended as a guide for users who already installed their Linux boxes, but are unsure of their possibilities or don't know what to do with them. As such, it does …
Top Layer Networks Secures $28 Million
Funding Enables Aggressive Market Expansion and Spurs Innovative Product Development Westboro, MA – August 20, 2002 – Top Layer Networks, Inc., the leading …
Buffer Overflows – Defending against arbitrary code execution
Buffer Overflows are one of the most common and potentially deadly forms of attack against computer systems to date. They allow an attacker to locally or remotely inject …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)