Please turn on your JavaScript for this page to function normally.
Compass Security Finjan SurfinGate Analysis

HTTP content filter technique promises protection at your perimeter infrastructure. While penetrating the clients’ infrastructure during a pen-test job, we are ready to …

Interview with Donald L. Pipkin, Information Security Architect for the Internet Security Division of Hewlett-Packard

Who is Donald L. Pipkin? I am an Information Security Architect at Hewlett-Packard. I’ve been with HP eighteen years; most of that time I have spent in the area of …

RAV AntiVirus fighting spam

Spam has increasingly become a problem on the Internet. Unfortunately, most countries around the world currently have no adequate laws or regulations to control it. It is a …

PKWARE and RSA Security Enter a Strategic Alliance

Bringing together PKWARE’s ZIP compression technology and RSA BSAFE encryption technology, the two companies will develop and market best-of-breed products that combine …

Interview with Darrell D. Simms, Director of Business and Wireless Product Development at TROY Wireless

Darrell D. Simms is an acknowledged leader in the wireless industry as a technologist. He is a noted evangelist for short distance wireless technologies such as Bluetooth and …

MS SQL Worm Roundup

Slammer (Helkern/Sapphire) is a worm that attempts to exploit vulnerabilities in Microsoft SQL 2000 servers and is causing increased traffic on UDP port 1434. This roundup …

Cross-Site Tracing (XST)

October 23 2002, Microsoft issued a press release describing a new browser/server based protective security measure within of internet explorer 6 sp1. This new feature, dubbed …

Interview with Eugene Kuznetsov, Founder, President and CTO of DataPower Technology Inc.

Eugene Kuznetsov is a technology visionary who has been working to address enterprise XML issues since the late 90s. Kuznetsov founded DataPower Technology, Inc. in 1999 to …

Interview with John Zurawski, Vice President of Sales and Marketing at Authentify

John Zurawski has more than 20 years of experience in computer software, Internet and high technology. He has held prominent positions for the analytical software firm SPSS, …

Astaro Security Linux V4 Announced at LinuxWorld Expo

Today at LinuxWorld Expo, Astaro Corporation announced Astaro Security Linux V4. Astaro Security Linux is an integrated software solution that provides great performance in an …

Detecting Wireless LAN MAC Address Spoofing

An attacker wishing to disrupt a wireless network has a wide arsenal available to them. Many of these tools rely on using a faked MAC address, masquerading as an authorized …

Interview with Scott C. Nevins, President and CEO of Protegrity

Protegrity is a leader in database security software, delivering privacy and protection solutions for mission-critical data stored in databases. Its flagship product …

Don't miss

Cybersecurity news