Expert analysis
Borderware Announces SteelGate Firewall & VPN Appliance
BorderWare Technologies Inc. released yet another security appliance in a relatively short time. After MXtreme Mail Firewall 3.0 and NameVault DNS Server 3.0 have seen their …
The Anatomy of Cross Site Scripting
Cross site scripting (XSS) flaws are a relatively common issue in web application security, but they are still extremely lethal. They are unique in that, rather than attacking …
SSL VPN Gateways: A New Approach to Secure Remote Access
Introduction Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) are quickly gaining popularity as serious contenders in the remote-access marketplace. Analysts predict …
RSA Security Extends Its Strategic Relationship With Microsoft
The RSA Security booth here in Amsterdam Here at the RSA Conference 2003 in Amsterdam, RSA Security announced an expansion of their relationship with Microsoft as the RSA …
1st European Information Security Awards Presented at RSA Conference 2003 Europe
Harri Pursiainen – Finland’s Ministry of Communications The opening day of this year’s annual RSA Conference Europe event, hosted a ceremony of announcing …
Microsoft Details New Security Innovations at RSA Conference 2003
Today at RSA Conference 2003, Mike Nash, corporate vice president of the Security Business Unit at Microsoft, detailed a series of new products and programs designed to help …
RSA Conference 2003 Opening With RSA CEO Keynote Speech
The keynote speech by Art Coviello was preceeded by the performance of the official RSA Conference 2003 band that entertained the crowd with a song that includes lyrics such …
nCipher Boosts Secure Web Server Performance
nCipher’s products od display nCipher introduced the nForce 1600, a new addition to its nForce family of hardware security modules (HSM). The new nForce 1600 HSM …
HNS Coverage from RSA Conference 2003 Europe
Now in its fourth successful year, RSA Conference delivers a 3-day intensive programme of conference sessions, tutorials, seminars and technology demonstrations. The Help Net …
Bugged by Spyware?
Do you know what your company’s computers are doing right now? Sure, they’re being used to run your business. But what else are they up to behind your back? Are …
Advanced cross site scripting and client automation
This paper discusses one method of exploiting POST variables vulnerable to cross site scripting and secured areas protected by a temporary session. Following a natural …
Email Security Testing Zone Powered Up With New Exploits
About two years ago, GFI launched the Email Security Testing Zone – a web site that enables organizations to check whether their email systems are vulnerable to email …