Mirko Zorz
New Type of Data Security by TenFold
TenFold Corporation made public a significant and unique feature of its Universal Application platform called SecurityByValue that introduces a simple way to manage a new type …
Kerio releases MailServer 5.5 for Mac OS X
Kerio Technologies Inc. introduced its secure corporate messaging server Kerio MailServer 5.5 for Mac OS X at the Macworld expo in San Francisco. It is the first and only mail …
Interview with Jay Chaudhry, CEO of AirDefense
Jay Chaudhry is the CEO of AirDefense, a company exclusively focused on WLAN security with technology that is designed to monitor and analyze 802.11 Layer 1 and Layer 2 …
Network Associates Acquires Deersoft Anti-Spam Technology
Network Associates, Inc. acquired Deersoft, Inc., a provider of anti-spam applications. The Deersoft acquisition is the first in a series of investments Network Associates is …
Interview with Leo Pluswick and Al Potter, Security Experts from ICSA Labs
What do people in the security industry think of wireless security? Here’s the opinion of two experts – Leo Pluswick and Al Potter, both from ICSA Labs, a division …
Aladdin Knowledge Systems’ eToken Drivers get Microsoft WHQL Certification
The drivers for Aladdin Knowledge Systems’ eToken family of USB authentication tokens were awarded Windows Hardware Quality Labs (WHQL) certification. This gives Windows …
Interview with Eric Janszen, CEO of Bluesocket Inc.
Eric Janszen is the CEO of Bluesocket Inc., a company that manufactures high performance solutions enabling the broad deployment and effective management of WLANs for data and …
O’Reilly releases a book on 802.11 security
802.11 Security by authors Bruce Potter and Bob Fleck gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing …
NT OBJECTives – focusing on securing web services
Recently a new tool for security assessment and defense was announced: The Fire & Water Toolkit – a collection of cohesive, interactive command line tools that …
Security Year in Review: VPNs and Firewalls
With many new and improved products on the market, this has been a good year for designing VPNs and deploying firewalls. Here’s an overview of happenings during 2002 …
Wireless Security and Privacy: Best Practices and Design Techniques
Wireless security is certainly one of this year's hot topics. Everybody is talking about wardriving, warchalking, and so on. This is just the perfect time to release a book …
Security Year in Review: Honeypots
This has been a great year for honeypots, finally this method of collecting security information got its deserved place under the spotlight as more people began to realize the …