Expert analysis
Interview with Leo Pluswick and Al Potter, Security Experts from ICSA Labs
What do people in the security industry think of wireless security? Here’s the opinion of two experts – Leo Pluswick and Al Potter, both from ICSA Labs, a division …
Aladdin Knowledge Systems’ eToken Drivers get Microsoft WHQL Certification
The drivers for Aladdin Knowledge Systems’ eToken family of USB authentication tokens were awarded Windows Hardware Quality Labs (WHQL) certification. This gives Windows …
New Year’s Resolutions to Secure Corporate Email
Secure email service provider 800onemail, recommends businesses toughen their email security in 2003 by making these resolutions:Evaluate all pre-2000, messaging systems; many …
Interview with Eric Janszen, CEO of Bluesocket Inc.
Eric Janszen is the CEO of Bluesocket Inc., a company that manufactures high performance solutions enabling the broad deployment and effective management of WLANs for data and …
The Position of Sophos in the Anti-Virus World
Sophos is the world’s 5th largest and the biggest European-headquartered anti-virus vendor. On the term of profitability, Sophos takes the third place, just after …
Security Year in Review by Mark Finan
Mark Finan is the Marketing Manager at Attix5 UK. Founded in South Africa and based in the United Kingdom, Attix5 is the market leader in the development of remote, managed …
Security Year in Review by Mixter
Mixter is a security expert, author of several open source security tools and whitepapers. Since 2000 he’s been working with Hacktivismo, a cDc-sponsored …
Security Year in Review by Melisa LaBancz
The development of the security scene in 2002 In my opinion the security scene has gone from being very heavily virus and random hacker oriented to focusing on the possibility …
Zero-Interaction Authentication
Laptops are vulnerable to theft, greatly increasing the likelihood of exposing sensitive files. Unfortunately, storing data in a cryptographic file system does not fully …
O’Reilly releases a book on 802.11 security
802.11 Security by authors Bruce Potter and Bob Fleck gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing …
RSA Security Enhances Security for Wireless LAN Environments
RSA Security Inc., announced the availability of new functionality for the industry-leading RSA SecurID two-factor authentication solution that enables enhanced protection in …
Tips for Safe Holiday Online Purchasing
While the shopping frenzy is at its all-year high, Network Associates’ business unit McAfee launched an educational campaign called Safe Holiday Online Purchasing …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities