Please turn on your JavaScript for this page to function normally.
Interview with Ivan Arce, CTO of Core Security Technologies

Ivan Arce, Chief Technology Officer of Core Security Technologies, sets the technical direction for the company and is responsible for overseeing the development, testing and …

Apache 2.0.46 Released – Security and Bugfix Release

The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the ninth public release of the Apache 2.0 HTTP Server. This Announcement notes the …

RSA Security 2003 IT Security Survey Presented

The Emmes Group, a San Francisco-based strategy consulting and market research firm, conducted an in-depth market research survey at the RSA 2003 Conference in San Francisco. …

Key Iterations and Cryptographic Salts

The following document discusses the use of key iterations and cryptographic salts to stop dictionary attacks in password based encryption (symmetric cryptography). One of the …

Palyh Worm Problems Could Easily Have Been Avoided

One frequently ignored aspect of corporate antivirus protection is the built-in file filtering facilities that such protection normally includes, and which represents a …

Interview with Dave Wreski, Founder and CEO of Guardian Digital

Dave Wreski is the founder and CEO of Guardian Digital, which he formed in May 1999 to solve the mounting security issues related to enterprises world-wide. With his vast …

BASEL II: Everyone is in the Risk Business Now

Managing risk used to be straightforward process, but all that is about to change for the world’s central banks and their IT departments. Basel II, the accord which …

Infosecurity Europe a Highly Successful Event

Neil Stinchcombe, public relations contact for this year’s Infosecurity Europe, dropped us an e-mail with some of the statistics on this highly successful event. …

Interview with Mark Komarinski, author of “PTG Interactive’s Training Course for Red Hat Linux: A Digital Seminar on CD-ROM 2/e”

Who is Mark Komarinski? Introduce yourself to our readers. A nice open-ended question. Professionally, I’m a Senior Linux System Administrator for Harvard Medical …

Handbook for Computer Security Incident Response Teams (CSIRTs)

The document is aimed at aiding the planning, creation and development of CSIRTs: teams trained specifically to deal with IT security incidents. One of the principal tasks of …

Linux Security: Public Key and Symmetric Key Encryption

This is an excerpt from “A Practical Guide to Red Hat Linux 8“. An interview with the author is available here. Public Key Encryption In order to use public key …

Trustix Secure Linux 2.0 Beta 2 Released

Trustix team announced that Trustix Secure Linux 2.0 beta 2 (aka Hurricane) is available for download. As this is a beta release, it is not intended for usage on production …

Don't miss

Cybersecurity news