Mirko Zorz
LT Auditor+ Security Software Bundled with Novell Netware
Blue Lance announced that a new version of LT Auditor+ has been developed exclusively for Novell and packaged with “Nakoma,” the next official release of NetWare. …
Interview with Sunil James, Manager of iDEFENSE’s Vulnerability Contributor Program
Sunil James manages iDEFENSE’s Vulnerability Contributor Program (VCP). He is a member of the company’s Technical Intelligence team. Sunil joined iDEFENSE in July …
Red Hat Linux 9 has been released
Red Hat, Inc. announced the availability of Red Hat Linux 9. Drawing from the work of the open source community, Red Hat Linux 9 allows users to take advantage of the newest …
Interview with Lisa Yeo, author of “Personal Firewalls for Administrators and Remote Users”
Lisa Yeo is a systems analyst with the Legislative Assembly Office in Edmonton, Alberta, Canada. Her start in security came in 1997 when she was made responsible for managing …
Interview with Scott Mann, co-author of Linux System Security: The Administrator’s Guide to Open Source Security Tools, 2/e
Who is Scott Mann? I am a computer jockey by profession. I’ve been working with UNIX and TCP/IP for nearly 25 years. Windows for 8 years. I’m also a sometime auto …
Interview with Christopher Negus, author of “Red Hat Linux 8 Bible”
Christopher Negus has been working with UNIX systems, the Internet, and (more recently) Linux systems for more than two decades. During that time, Chris worked at AT&T …
Three-Day Virtual Conference on Remote Access, VPN and Web Application Security
Rainbow Technologies announced that a trio of security experts will participate in multiple panel discussions ranging from remote access deployments to virtual private network …
Red Hat Linux 8 Bible
As Linux gains more and more popularity we have books on the subject being published frequently. This is one of the latest books on Red Hat Linux 8 that, as all books do, …
Maximum Security 4/e
When you're about to read a book that already reached its fourth edition, you know you're about to embark on an interesting journey. Since it's debut in 1997, the Maximum …
Interview with Steve Kalman, Managing Director for Esquire Micro Consultants
Who is Steve Kalman? I’ve been in MIS since 1968, when I learned to program in Fortran at Ohio State University. Over the years I’ve been a programmer, systems …
Interview with Richard Boyer, Vice President of Program Management of NetFrameworks
Richard Boyer is Vice President of Program Management of NetFrameworks. Rich heads the security training, security planning tools, and secure content management business …
Personal Firewalls for Administrators and Remote Users
Many users think that their personal computers are not susceptible to any kind of attack. Despite their belief, many computers, especially those behind a permanent broadband …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility