Expert analysis
Positive Identification in a Wireless World
The use of wireless systems for network and Web access is exploding-from wireless LANs to e-mail capable cell phones. It makes network access completely portable, and with …
ISS “X-Force Internet Watch” Web Site Compromised
Well known defacement archive Zone-H reported that one of the Internet Security Systems’ servers has been compromised. According to the Google’s cache, the server, …
Web Seminar on FIRE Forensic Linux Environment
This Wednesday, May 7th at 1pm EDT (1700 UTC), SANS is hosting a web seminar titled “5 Ways to FIRE up Your Incident Response and Forensic Environment”. Webcast …
OpenBSD 3.3 has been released
OpenBSD 3.3. is here. To get the files for this release either order a CDROM or check out one of the FTP page for a list of mirrors. Some of the new features are: Integration …
Interview with Anonymous, lead author of “Maximum Security 4/e”
Who is Anonymous? Introduce yourself to our readers. I’m not sure Pearson Education really wants this question answered. In any event, I was born 11/24/1964 at 12:01 …
Perfigo Launches SecureSmart WLAN Security Suite
San Francisco based company Perfigo, Inc., announced the general availability of their SecureSmart WLAN suite. This suite of products is designed to securely integrate 802.11 …
LynuxWorks powers advanced biometric security solutions from Cogent Identification Systems
LynuxWorks announced that its real-time operating system (RTOS), LynxOS, has been chosen as a preferred software platform for Cogent Systems high-performance biometric …
EnGarde Secure Linux Community Edition released
Guardian Digital announced the next generation of the award-winning EnGarde Secure Linux Community Edition. Leveraging the best open source applications available, combined …
Interview with Nicholas Raba, co-author of “Maximum Security 4/e”
Who is Nicholas Raba? Introduce yourself to our readers. Call me Nick. I’m the author of SecureMac.com, a site devoted to Macintosh security. This site has allowed me a …
Networks Risk Grounding Without Airport-Level Security
It is one of the old security adages that the nature of the threats to networks are ever-changing. Today they encompass physical threats (theft of computers), technical …
Corporate Access Cards: Securing Corporate Networks With Military-Strength Digital Identity Solutions
‘Identity theft’ has recently hit the headlines as a major security issue but the importance of digital identity and how to protect it has been a consideration for …
Interview with Greg Vaughn, co-author of “Maximum Security 4/e”
Who is Greg Vaughn? Introduce yourself to our readers. I’m primarily an enterprise application programmer. I’d been a consultant for a number of years before …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?