Expert analysis
Identix Announces Strong Performance in Latest International Biometric Group Comparative Study
Identix Incorporated demonstrated strong performance in Round Four of International Biometric Group’s (IBG) Comparative Biometric Testing. The latest comparative study …
Interview with Joshua Wright, Network Engineer for Johnson & Wales University
Joshua Wright is a Network Engineer for Johnson & Wales University. He’s been investigating wireless security and one of the results of his research has been the …
New Security Industry Market Research Firm Launched
Quarterback Consulting, was founded by Cyrus Maaghul, a successful entrepreneur, market researcher and information technology professional. Their goal is to become the most …
Interview with Ian Curry, Vice President and Chief Marketing Officer of Entrust
Ian Curry is the Vice President and Chief Marketing Officer of Entrust. By delivering enhanced Internet security capabilities built on identification, entitlements, …
Etherleak: Ethernet frame padding information leakage
Multiple platform Ethernet Network Interface Card (NIC) device drivers incorrectly handle frame padding, allowing an attacker to view slices of previously transmitted packets …
New Type of Data Security by TenFold
TenFold Corporation made public a significant and unique feature of its Universal Application platform called SecurityByValue that introduces a simple way to manage a new type …
Kerio releases MailServer 5.5 for Mac OS X
Kerio Technologies Inc. introduced its secure corporate messaging server Kerio MailServer 5.5 for Mac OS X at the Macworld expo in San Francisco. It is the first and only mail …
Interview with Jay Chaudhry, CEO of AirDefense
Jay Chaudhry is the CEO of AirDefense, a company exclusively focused on WLAN security with technology that is designed to monitor and analyze 802.11 Layer 1 and Layer 2 …
Network Associates Acquires Deersoft Anti-Spam Technology
Network Associates, Inc. acquired Deersoft, Inc., a provider of anti-spam applications. The Deersoft acquisition is the first in a series of investments Network Associates is …
Linux Security: Reflections on 2002
Here are my reflections on Linux security in 2002 and predictions for 2003. All statements not otherwise attributed are my opinions. I think that the major change in 2002 over …
Interview with Leo Pluswick and Al Potter, Security Experts from ICSA Labs
What do people in the security industry think of wireless security? Here’s the opinion of two experts – Leo Pluswick and Al Potter, both from ICSA Labs, a division …
Aladdin Knowledge Systems’ eToken Drivers get Microsoft WHQL Certification
The drivers for Aladdin Knowledge Systems’ eToken family of USB authentication tokens were awarded Windows Hardware Quality Labs (WHQL) certification. This gives Windows …