Expert analysis
“Enterprise Vulnerability Assessment and Remediation” web seminar
On Tuesday November 12, 2002 eEye will host a web seminar titled “Technical Demonstration: Enterprise Vulnerability Assessment and Remediation”. This Webinar is a …
Honeypot Best Practices security conference
The very first security conference ever dedicated to honeypot technologies is starting today in Las Vegas. Key features and benefits of this event: Hear multiple in depth case …
Nokia and Trend Micro establish a strategic alliance
Nokia, and Trend Micro, announced a Memorandum of Understanding to establish a strategic alliance focused on delivering network-based, best-of-breed content security solutions …
“Wireless Security: A Contradiction in Terms?” web seminar
On Thursday, November 7, 2002, renowned security expert and TruSecure Chief Technical Officer, will host a webinar titled “Wireless Security: A Contradiction in …
nCipher and Cardinal partner on secure e-transactions
Cardinal, a develop of e-transaction security products, is the latest e-payment company to use nCipher’s hardware-based encryption products to secure online payments. …
The Cross Site Scripting FAQ
Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which …
Gemplus introduces ResIDent
Gemplus launched ResIDent, a smart card-based ID system designed for advanced e-Government programs. ResIDent enables governments to offer more secure, versatile and …
Wireless LAN Security
Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely …
Security Enhanced Linux BETA Available
A fully functioning distribution of Security Enhanced Linux is now available in BETA for community and industry evaluation. The three-CD set is available here. The shipping …
“Untangling Web Services Security” web seminar
On Wednesday, November 20 2002, RSA Security will host a web seminar titled “Untangling Web Services Security”. RSA Security Technical Director of Developer …
The danger of PDAs
PDAs (personal digital assistants), pocket-sized diaries that are becoming increasingly more powerful, can represent a serious threat to corporate security. As PDAs become …
Snort Enterprise Implementation
The purpose of this guide is to document the installation and configuration of a complete Snort enterprise implementation. This guide contains all the necessary information …
Featured news
Resources
Don't miss
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR