Expert analysis
Interview with Mark G. Sobell, author of “A Practical Guide to Red Hat Linux 8”
Mark G. Sobell is the author of best-selling UNIX and Linux books: “A Practical Guide to the UNIX System”, “UNIX System V: A Practical Guide”, “A …
LT Auditor+ Security Software Bundled with Novell Netware
Blue Lance announced that a new version of LT Auditor+ has been developed exclusively for Novell and packaged with “Nakoma,” the next official release of NetWare. …
Firewall + Firewall Policy = Improved Security
So far this year analysts, government bodies and even security companies have all stated that Internet security incidents are on the rise. Whether fact or fiction, the truth …
Cyber Terrorism – is it a Serious Threat to Commercial Organizations?
Cyber Terrorism is a hot topic in the popular press and on general Computer industry web sites. Unfortunately, the “hype’ surrounding the topic is actually doing a …
Interview with Sunil James, Manager of iDEFENSE’s Vulnerability Contributor Program
Sunil James manages iDEFENSE’s Vulnerability Contributor Program (VCP). He is a member of the company’s Technical Intelligence team. Sunil joined iDEFENSE in July …
Red Hat Linux 9 has been released
Red Hat, Inc. announced the availability of Red Hat Linux 9. Drawing from the work of the open source community, Red Hat Linux 9 allows users to take advantage of the newest …
The Case For Secure Email
It may not be surprising for you to learn that email is not a secure medium of communication; however, it may surprise you to learn just how inherently insecure it really is …
Interview with Lisa Yeo, author of “Personal Firewalls for Administrators and Remote Users”
Lisa Yeo is a systems analyst with the Legislative Assembly Office in Edmonton, Alberta, Canada. Her start in security came in 1997 when she was made responsible for managing …
How to Secure your Teleworkers with a VPN
Today’s enterprise is increasingly becoming a distributed workplace made up of branch offices, telecommuters, after-hour workers, contractors, business partners and …
White Hat Security “Hacking Web Applications” Training
White Hat Security announced a two day training session, dealing with topics related to hacking Web applications. The course, that will be held on April 7/8 in Santa Clara …
Reactivity XML Firewall Tackles Costs of Securing XML
Reactivity, Inc. recently introduced Reactivity XML Firewall, a network security appliance designed to protect new-generation applications, while tackling the operating costs …
Spam Checklist – April Fool’s Day is Approaching
As April Fool’s day is less then a week away, filtering company Clearswift is advising organizations to take great care of spam emails that traditionally use this day as …