Expert analysis
Web Seminar on FIRE Forensic Linux Environment
This Wednesday, May 7th at 1pm EDT (1700 UTC), SANS is hosting a web seminar titled “5 Ways to FIRE up Your Incident Response and Forensic Environment”. Webcast …
OpenBSD 3.3 has been released
OpenBSD 3.3. is here. To get the files for this release either order a CDROM or check out one of the FTP page for a list of mirrors. Some of the new features are: Integration …
Interview with Anonymous, lead author of “Maximum Security 4/e”
Who is Anonymous? Introduce yourself to our readers. I’m not sure Pearson Education really wants this question answered. In any event, I was born 11/24/1964 at 12:01 …
Perfigo Launches SecureSmart WLAN Security Suite
San Francisco based company Perfigo, Inc., announced the general availability of their SecureSmart WLAN suite. This suite of products is designed to securely integrate 802.11 …
LynuxWorks powers advanced biometric security solutions from Cogent Identification Systems
LynuxWorks announced that its real-time operating system (RTOS), LynxOS, has been chosen as a preferred software platform for Cogent Systems high-performance biometric …
EnGarde Secure Linux Community Edition released
Guardian Digital announced the next generation of the award-winning EnGarde Secure Linux Community Edition. Leveraging the best open source applications available, combined …
Interview with Nicholas Raba, co-author of “Maximum Security 4/e”
Who is Nicholas Raba? Introduce yourself to our readers. Call me Nick. I’m the author of SecureMac.com, a site devoted to Macintosh security. This site has allowed me a …
Networks Risk Grounding Without Airport-Level Security
It is one of the old security adages that the nature of the threats to networks are ever-changing. Today they encompass physical threats (theft of computers), technical …
Corporate Access Cards: Securing Corporate Networks With Military-Strength Digital Identity Solutions
‘Identity theft’ has recently hit the headlines as a major security issue but the importance of digital identity and how to protect it has been a consideration for …
Interview with Greg Vaughn, co-author of “Maximum Security 4/e”
Who is Greg Vaughn? Introduce yourself to our readers. I’m primarily an enterprise application programmer. I’d been a consultant for a number of years before …
How to Use Passwords Securely
Every day, more and more services and applications require password authentication. For this reason, we will be looking at the risks of using the same password for various …
Interview with Billy Barron, co-author of “Maximum Security 4/e”
Who is Billy Barron? Introduce yourself to our readers. I am a 15 year veteran of the computer industry. What’s unique about my background is that I’ve spent about …