Please turn on your JavaScript for this page to function normally.
Interview with Leo Pluswick and Al Potter, Security Experts from ICSA Labs

What do people in the security industry think of wireless security? Here’s the opinion of two experts – Leo Pluswick and Al Potter, both from ICSA Labs, a division …

Aladdin Knowledge Systems’ eToken Drivers get Microsoft WHQL Certification

The drivers for Aladdin Knowledge Systems’ eToken family of USB authentication tokens were awarded Windows Hardware Quality Labs (WHQL) certification. This gives Windows …

New Year’s Resolutions to Secure Corporate Email

Secure email service provider 800onemail, recommends businesses toughen their email security in 2003 by making these resolutions:Evaluate all pre-2000, messaging systems; many …

Interview with Eric Janszen, CEO of Bluesocket Inc.

Eric Janszen is the CEO of Bluesocket Inc., a company that manufactures high performance solutions enabling the broad deployment and effective management of WLANs for data and …

The Position of Sophos in the Anti-Virus World

Sophos is the world’s 5th largest and the biggest European-headquartered anti-virus vendor. On the term of profitability, Sophos takes the third place, just after …

Security Year in Review by Mark Finan

Mark Finan is the Marketing Manager at Attix5 UK. Founded in South Africa and based in the United Kingdom, Attix5 is the market leader in the development of remote, managed …

Security Year in Review by Mixter

Mixter is a security expert, author of several open source security tools and whitepapers. Since 2000 he’s been working with Hacktivismo, a cDc-sponsored …

Security Year in Review by Melisa LaBancz

The development of the security scene in 2002 In my opinion the security scene has gone from being very heavily virus and random hacker oriented to focusing on the possibility …

Zero-Interaction Authentication

Laptops are vulnerable to theft, greatly increasing the likelihood of exposing sensitive files. Unfortunately, storing data in a cryptographic file system does not fully …

O’Reilly releases a book on 802.11 security

802.11 Security by authors Bruce Potter and Bob Fleck gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing …

RSA Security Enhances Security for Wireless LAN Environments

RSA Security Inc., announced the availability of new functionality for the industry-leading RSA SecurID two-factor authentication solution that enables enhanced protection in …

Tips for Safe Holiday Online Purchasing

While the shopping frenzy is at its all-year high, Network Associates’ business unit McAfee launched an educational campaign called Safe Holiday Online Purchasing …

Don't miss

Cybersecurity news