Please turn on your JavaScript for this page to function normally.
Interview with Joshua Wright, Network Engineer for Johnson & Wales University

Joshua Wright is a Network Engineer for Johnson & Wales University. He’s been investigating wireless security and one of the results of his research has been the …

New Security Industry Market Research Firm Launched

Quarterback Consulting, was founded by Cyrus Maaghul, a successful entrepreneur, market researcher and information technology professional. Their goal is to become the most …

Interview with Ian Curry, Vice President and Chief Marketing Officer of Entrust

Ian Curry is the Vice President and Chief Marketing Officer of Entrust. By delivering enhanced Internet security capabilities built on identification, entitlements, …

Etherleak: Ethernet frame padding information leakage

Multiple platform Ethernet Network Interface Card (NIC) device drivers incorrectly handle frame padding, allowing an attacker to view slices of previously transmitted packets …

New Type of Data Security by TenFold

TenFold Corporation made public a significant and unique feature of its Universal Application platform called SecurityByValue that introduces a simple way to manage a new type …

Kerio releases MailServer 5.5 for Mac OS X

Kerio Technologies Inc. introduced its secure corporate messaging server Kerio MailServer 5.5 for Mac OS X at the Macworld expo in San Francisco. It is the first and only mail …

Interview with Jay Chaudhry, CEO of AirDefense

Jay Chaudhry is the CEO of AirDefense, a company exclusively focused on WLAN security with technology that is designed to monitor and analyze 802.11 Layer 1 and Layer 2 …

Network Associates Acquires Deersoft Anti-Spam Technology

Network Associates, Inc. acquired Deersoft, Inc., a provider of anti-spam applications. The Deersoft acquisition is the first in a series of investments Network Associates is …

Linux Security: Reflections on 2002

Here are my reflections on Linux security in 2002 and predictions for 2003. All statements not otherwise attributed are my opinions. I think that the major change in 2002 over …

Interview with Leo Pluswick and Al Potter, Security Experts from ICSA Labs

What do people in the security industry think of wireless security? Here’s the opinion of two experts – Leo Pluswick and Al Potter, both from ICSA Labs, a division …

Aladdin Knowledge Systems’ eToken Drivers get Microsoft WHQL Certification

The drivers for Aladdin Knowledge Systems’ eToken family of USB authentication tokens were awarded Windows Hardware Quality Labs (WHQL) certification. This gives Windows …

New Year’s Resolutions to Secure Corporate Email

Secure email service provider 800onemail, recommends businesses toughen their email security in 2003 by making these resolutions:Evaluate all pre-2000, messaging systems; many …

Don't miss

Cybersecurity news