Please turn on your JavaScript for this page to function normally.
Interview with Ratmir Timashev, CEO of Aelita Software

Ratmir Timashev brings a rare combination of business savvy and technical knowledge to his role as CEO of Aelita Software, allowing him to create a vision for the company that …

The Advantages of Block-Based Protocol Analysis for Security Testing

This paper describes a effective method for black-box testing of unknown or arbitrarily complex network protocols for common problems relating to the security of a program or …

Trend Micro Announces Q4 2002 Earnings

Trend Micro, a worldwide leader in network antivirus and Internet content security solutions, today announced Q4 2002 earnings – posting a group net profit of Y7.89 …

Webcast – Eliminate the SANS/FBI Top 20 Internet Vulnerabilities

In the following two briefings, Jason Fossen, the founder and president of Fossen Networking & Security and Hal Pomeranz, founder and CEO of Deer Run Associates will …

Interview with Steven Dabbs, CEO & President of ScannerX

Steven Dabbs, CEO & President of ScannerX, has more than 15 years experience in the Internet and real estate industries. He founded an early Internet web hosting company …

Compass Security Finjan SurfinGate Analysis

HTTP content filter technique promises protection at your perimeter infrastructure. While penetrating the clients’ infrastructure during a pen-test job, we are ready to …

Interview with Donald L. Pipkin, Information Security Architect for the Internet Security Division of Hewlett-Packard

Who is Donald L. Pipkin? I am an Information Security Architect at Hewlett-Packard. I’ve been with HP eighteen years; most of that time I have spent in the area of …

RAV AntiVirus fighting spam

Spam has increasingly become a problem on the Internet. Unfortunately, most countries around the world currently have no adequate laws or regulations to control it. It is a …

PKWARE and RSA Security Enter a Strategic Alliance

Bringing together PKWARE’s ZIP compression technology and RSA BSAFE encryption technology, the two companies will develop and market best-of-breed products that combine …

Interview with Darrell D. Simms, Director of Business and Wireless Product Development at TROY Wireless

Darrell D. Simms is an acknowledged leader in the wireless industry as a technologist. He is a noted evangelist for short distance wireless technologies such as Bluetooth and …

MS SQL Worm Roundup

Slammer (Helkern/Sapphire) is a worm that attempts to exploit vulnerabilities in Microsoft SQL 2000 servers and is causing increased traffic on UDP port 1434. This roundup …

Cross-Site Tracing (XST)

October 23 2002, Microsoft issued a press release describing a new browser/server based protective security measure within of internet explorer 6 sp1. This new feature, dubbed …

Don't miss

Cybersecurity news