Please turn on your JavaScript for this page to function normally.
Managing the security of data flow

Customer Relationship Management (CRM) systems are cited as one of the major technology successes of the last decade. Although these ‘super databases’ enable the …

SafeNet Announces Newest Version of SoftRemote VPN Product

SafeNet, Inc., announced the availability of the latest version of its VPN client software SoftRemote. 10.0 release of SoftRemote supports the latest IETF Network Address …

MailFrontier Releases Matador 2.0 Desktop Anti- Spam Solution

Messaging company MailFrontier, today announced the latest release of their anti-spam product Matador. Matador 2.0 now supports Outlook Express and several web based e-mail …

Large Scale Network Forensics – It’s not just for Law Enforcement Anymore

Computer forensics have hit the big time. A previously “superniche” technology, forensics have moved into the collective consciousness of IT sys. admins. and …

Interview with Steve Kalman, Managing Director for Esquire Micro Consultants

Who is Steve Kalman? I’ve been in MIS since 1968, when I learned to program in Fortran at Ohio State University. Over the years I’ve been a programmer, systems …

Interview with Richard Boyer, Vice President of Program Management of NetFrameworks

Richard Boyer is Vice President of Program Management of NetFrameworks. Rich heads the security training, security planning tools, and secure content management business …

Interview with Christopher Alberts, a senior member of the technical staff in the Networked Systems Survivability Program at the Software Engineering Institute

Christopher Alberts is a senior member of the technical staff in the Networked Systems Survivability Program at the Software Engineering Institute (SEI). Before joining the …

Information Security Excellence Awards Winners Announced

Information Security Magazine announced this years’ winners of prestige Information Security Excellence Awards. Winners were chosen to represent 10 different thematic …

A practical approach for defeating Nmap OS-Fingerprinting

Remote OS Fingerprinting is becoming more and more important, not only for security pen-testers, but for the black-hat. Just because Nmap is getting popularity as the tool for …

Tripwire Security Seminars in March 2003

During March, Tripwire is holding several product and security related web seminars. You can register for them through Tripwire Events page at . These are some of the most …

IBM has released 6 new prep tutorials for DB2 Certification

The new tutorials will teach you the basics of the DB2 products and tools, DB2 security, and much more. You need to make a FREE registration to view the tutorials. Here they …

Interview with Carlisle Adams, Senior Cryptographer and Principal of Security at Entrust, Inc.

Carlisle Adams is recognized internationally for his many contributions to the design, specification, and standardization of public-key infrastructures. He is senior …

Don't miss

Cybersecurity news