Expert analysis
Infosecurity Europe 2004 Showcase Video
Here’s a showcase of the Infosecurity Europe 2004 conference in London. The video is 4:53 minutes in length, available for download in Windows Media 9 256K (9.08 MB) and …
The Trends in Information Security Spending
Cisco Systems at Infosecurity Europe 2004 According to the latest industry research comissioned by Cisco Systems, businesses still don’t spend enough money on …
nCipher introduces nToken
nCipher at Infosecurity Europe 2004 nToken is a low-cost client-side hardware authentication module that allows users of nCipher’s netHSM products to ensure the …
Session Hijacking Explained
For the first learning session on Help Net Security, we’ve got Caleb Sima, SPI Dynamics CTO and co-founder, discussing session hijacking attacks. While session hijacking …
Sending IPv6 Packets To Check Firewall Rules
IP version 6 is available in most recent products such as routers, firewalls and operating systems. Administrators and security professionals are faced to new challenges when …
Audio Interview with Greg Hoglund and Gary McGraw, Authors of “Exploiting Software: How to Break Code”
The authors of the acclaimed “Exploiting Software: How to Break Code” voice their opinion on close source vs. open source security, the most ridiculous mistakes …
Mail Scanning With Exim And The Exiscan ACL
With all the spam and viruses circulating the Internet these days, any network admin worth his or her salt will have appropriate filters in place to prevent these irritants …
Interview with Paul Zimski, Product Strategy Manager For Harris Corporation’s STAT Computer Security Unit
Paul Zimski, CISSP, is the product strategy manager for Harris Corporation’s STAT computer security unit, which provides network security solutions backed by decades of …
The Issue of Compliance – It’s Here and It’s Expanding!
By now, most high-tech conferences have devoted at least one 30-minute session to the topic of Sarbanes-Oxley (aka “Sarbox”). Complexity of language aside, Sarbox …
Large Enterprise Application Security
Large enterprises of a thousand people or more often have distinctly different information security architectures than smaller companies. However, typically they treat their …
The Future of Phishing
This article examines how attackers are likely to respond to the current move towards 2-factor authentication as a defence against phishing scams, and describes an alternative …
Using the PuTTY SSH Client on Nokia Series 60 Phones
While doing a regular checkup on Slashdot, I’ve came across a new product announcement concerning PuTTY being ported to Nokia Series 60. If you are not familiar with …