Expert analysis
Strengthening Security for Small Businesses With Safe@ 3.0
SofaWare Technologies launched Safe@ 3.0, bringing enterprise-class security to the small businesses and consumers. The complete suite of Safe@ solutions, including Safe@Home, …
NT OBJECTives – focusing on securing web services
Recently a new tool for security assessment and defense was announced: The Fire & Water Toolkit – a collection of cohesive, interactive command line tools that …
Internet Cleanup 3.0 Protects Your Privacy
Aladdin Systems, Inc. (not to be confused with Aladdin Knowledge Systems) announced a new version of Internet Cleanup, software recently acquired from Kroll Ontrack. Internet …
Session Fixation Vulnerability in Web-based Applications
Many web-based applications employ some kind of session management to create a user-friendly environment. Sessions are stored on server and associated with respective users by …
Ubizen on E-Business Security
At this year’s RSA Conference 2002 Paris, we met with people from the European security company Ubizen. We talked with Carlo Sch??pp, Executive Vice President Ubizen …
Security Year in Review: VPNs and Firewalls
With many new and improved products on the market, this has been a good year for designing VPNs and deploying firewalls. Here’s an overview of happenings during 2002 …
Protecting Port 80 with “Security Gateway”
Blue Coat Systems is a developer of Web security appliances which are the industry’s first dedicated port 80 security solutions. If the name Blue Coat Systems …
Backup Securely with Backup Professional
While attending the RSA Conference 2002, held this October in Paris, we had the opportunity to talk with Roy Davies, Director of Corporate Affairs at Attix5. Founded in South …
Security Year in Review: Honeypots
This has been a great year for honeypots, finally this method of collecting security information got its deserved place under the spotlight as more people began to realize the …
Interview with Bob Toxen, Author of “Real World Linux Security”
1. Who is Bob Toxen? I am cut from standard geek material. I love science fiction, especially Star Trek. From the time I was 14 I was hooked on computers. I was introduced to …
Array Networks Delivers Network Traffic Analysis to Protect Intellectual Property and Detect Network Abuse
Array Networks announced the availability of its new Array SR (Security Reconnaissance) Series, the first wire-speed network traffic analyzer designed to detect potential …
Protect your Macintosh with MacScan
SecureMac.com announced the release of their first security application to protect the Macintosh from spyware and applications that could offer remote access when improperly …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities