Help Net Security
Dealing with External Computer Security Incidents
Dealing with computer security incidents is extremely difficult. There are many ways that incidents can occur and many types of impact they can have on an organization. There …
netForensics Unveils the Next Generation of Security Information Management
Advanced SIM Offering Features State-of-the-Art Visualization and Risk Assessment Capabilities WASHINGTON, Oct. 23 /PRNewswire/ — netForensics, Inc., the recognized …
F-Secure Receives World’s First Security Certificate For Windows Powered Mobile Platforms
F-Secure Corporation is the first company in the world to receive United States government validation from National Institute of Standards and Technology for cryptographic …
Cyberguard Firewalls To Protect Major Mideast Telecom
Saudi Telecom Company – Kingdom’s Only Communications Provider – Selects CyberGuard Firewalls To Secure Network Infrastructure Ft. Lauderdale, Fla., and …
Datakey Announces Third Quarter Results
MINNEAPOLIS, Oct. 22, 2002 – Datakey Inc. (Nasdaq: DKEY; www.datakey.com), a trusted developer of smart card solutions for securing e-business, today reported revenue of …
Cisco Systems to Acquire Psionic Software
Software Reduces Network Security False Alarms, Improving Business Productivity and Lowering Costs SAN JOSE, Calif., Oct. 22, 2002 — Cisco Systems, Inc., today announced …
Baltimore Is First To Remove The Cost and Complexity of PKI Security
Baltimore launches Trusted Business Suite putting the emphasis on business applications. LONDON, October 22, 2002: Baltimore Technologies (London:BLM), a leading e-security …
Open Source Digital Forensics Tools: The Legal Argument
This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a tool must be reliable and …
Can you trust your computer?
Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call “trusted …
DBCC SHOWTABLEAFFINITY buffer overrun
Martin Rakhmanoff wrote this article to (better) document the process of finding and exploiting buffer overrun bugs. Provided sample code is written for Microsoft SQL Server …
Snapgear Launches Into Controller Market
Secure industrial control applications made possible with Snap Gear security expertise. SALT LAKE CITY, Utah – October 21st, 2002 – SnapGear Inc., a leading …
Panda Software Reports on New Opaserv.E Worm
Panda Software’s technical support services, the company’s Virus Laboratory and Panda ActiveScan, the online virus scanner, have all been recording incidents …
Featured news
Resources
Don't miss
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites