Help Net Security
Research Firm Recognizes Check Point as VPN Market Leader
Leader Position Based on Ability to Execute and Completeness of Vision REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point Software Technologies Ltd. (Nasdaq: CHKP), the …
Check Point Software And Internet Security Systems Secure Networld+Interop and COMDEX Event Network
Check Point and ISS Provide Integrated Security Framework with Best-of-Breed Technology for Largest Short-Term Network REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point …
Baltimore Technologies Plc Announces Restructuring Close to Completion and Half-Year Results in Line with Expectations for 6 Months Ended June 30 2002
London, UK – September 10, 2002 – Baltimore Technologies (London:BLM), (“Baltimore”) today announced its interim results for the six months ended 30 …
The Weakest Link in Disaster Recovery
Much of the focus of disaster recovery planning is on creating redundant data sites and backup tapes. Very often, a crucial component is overlooked: that of keeping current …
Ositis Ships SiteStripper
SiteStripper Increases Productivity, Manages Resources and Enforces Policies to Prevent Employees from Accessing Prohibited Websites Pleasanton, CA — September 6, 2002 …
Trend Micro to Join Nikkei Stock Average
Tokyo, Japan – September 9, 2002 – Trend Micro Inc. (TSE: 4704, Nasdaq:TMIC), a leading provider of antivirus and Internet content security software and services …
SSH Communications Security Achieves Opsec Certification From Check Point Software
SSH Certifier Integrates with Industry’s Most Recognized Security Framework HELSINKI, FINLAND and PALO ALTO, Calif. – Date 10, 2002 – SSH Communications …
How To Ensure Security When The Business Itself Is Confidential, Personal Information
TruSecure and American Tenant Screen Present a Free Webinar on Security for Information Businesses Smaller businesses face the same information security challenges as Global …
Multitool Linux: Practical Uses for Open Source Software
This book is intended as a guide for users who already installed their Linux boxes, but are unsure of their possibilities or don't know what to do with them. As such, it does …
Top Layer Networks Secures $28 Million
Funding Enables Aggressive Market Expansion and Spurs Innovative Product Development Westboro, MA – August 20, 2002 – Top Layer Networks, Inc., the leading …
Buffer Overflows – Defending against arbitrary code execution
Buffer Overflows are one of the most common and potentially deadly forms of attack against computer systems to date. They allow an attacker to locally or remotely inject …
SonicWALL Continues Market Share Leadership
Infonetics Study Ranks SonicWALL Worldwide Unit Shipment Leader of VPN And Firewall Appliances Between $490 and $1,499 SUNNYVALE, Calif., Sept. 3 /PRNewswire-FirstCall/ …
Featured news
Resources
Don't miss
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)
- Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)
- Faster LLM tool routing comes with new security considerations
- Your wearable knows your heartbeat, but who else does?