Please turn on your JavaScript for this page to function normally.
Information Security Checklist

Today’s heightened awareness of the need to secure IT infrastructures and protect mission critical data is leading more and more organizations to reevaluate their …

Protecting Databases

One of the more recent evolutions in network security has been the movement away from protecting the perimeter of the network to protecting data at the source. The reason …

Prison for computer crime

The Justice Ministers of the 15 Member States of the European Union have decided to modify their country laws, with the aim of including prison sentences for the authors of …

Blindfolded SQL Injection

Until today, exploiting SQL Injection attacks depended on having the Web Server return detailed error messages or having any other source of information. As a result, many …

SCO vs. IBM

SCO’s lawsuit against IBM and SCO’s demanding money from companies using Linux has caused some using Linux to worry that this wonderful “too good to be …

St. Bernard Announces E-mail Filtering Appliance

San Diego based St. Bernard Software Inc., announced ePrism Mail Filter – their new e-mail filtering appliance featuring a full combo of e-mail security, spam …

NIST to Host a Biometrics Conference

The National Institute of Standards and Technology is holding the Biometric Consortium’s fall conference, BC 2003, to showcase recent advances in the field and examine …

Symantec AntiVirus for Handhelds Product Line Announced

Symantec Corp. announced the Symantec AntiVirus for Handhelds line of consumer and enterprise solutions. The product line will include three versions of Symantec AntiVirus for …

Edelman Cybersecurity Survey: Viruses Impact One-Third Of American Internet Users

Edelman provides comprehensive public relations and marketing services to computer security companies in the United States. They’re recent survey shows that nearly one …

Sygate Announces Sygate Secure Enterprise 3.5

The latest version of Sygate’s enterprise solution includes strategic enhancements that enable Sygate agents to automatically and cost-effectively enforce corporate …

PointGuard: Protecting Pointers From Buffer Overflow Vulnerabilities

Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the dominant form of software security vulnerability. …

Blaster Only Set to Stun

Once again, it appears that the worm authors had caught system administrators with their trousers down. Despite the availability of a patch since mid-July to fix the …

Don't miss

Cybersecurity news