Expert analysis
Gemplus digital signature solution awarded with certification
Gemplus is the world’s leading provider of solutions based on smart card technology. It has operations in 37 countries and a presence in every major marketplace. Here at …
Wireless Security Threats
The security of wireless networks has been a constant topic in the news during the past few months. You’ve probably heard of terms like wardriving, warchalking and …
NetScreen opens new EMEA offices
NetScreen Technologies, Inc., one of the leading developers of integrated network security solutions, announced at RSA Conference 2002 Europe that they have opened a number of …
RSA Conference 2002 – The Exhibitors
This year’s RSA Conference features 2900 square meters of exhibit space and more than 60 vendors displaying their products. As with any conference, some of the vendors …
RSA Conference 2002 Grand Opening
The first day of the RSA Conference is behind us. As we mentioned earlier, Monday was tutorial day and was divided into two areas: developer and enterprise tutorials. The …
News from the RSA Security press conference
This afternoon RSA Security held a press conference where they informed the public of some new partnerships and products. One of the new releases is RSA Clear Trust 5.0. This …
Microsoft CTO talks about security and open source. What security?
It’s been quite a speech, the one delivered by Craig Mundie – Senior Vice President and CTO Advanced Strategies and Policy here at the RSA Conference in Paris. …
RSA Conference 2002 Paris – Tutorial day
Monday, 7 October 2002 – Today is the first day of the RSA Conference here at Le Palais des Congrès in Paris. This first day is dedicated to the tutorials. They are …
Interview with Jon Callas, CTO of PGP Corporation
Jon Callas is an innovator and an acknowledged expert in all major aspects of contemporary business security, including cryptography, operating system security, public key …
Interview with Roderick W. Smith, Author of “Advanced Linux Networking”
Roderick W. Smith is a professional computer book author who has extensive experience writing handbooks for users. A Linux and networking expert, he has several books to his …
A Note on Proactive Password Checking
Nowadays, proactive password checking algorithms are based on the philosophy of the dictionary attack, and they often fail to prevent some weak passwords with low entropy. In …
OWASP Guide to Building Secure Web Applications version 1.1
The Guide covers various web application security topics from architecture to preventing attack specifics like cross site scripting, cookie poisoning and SQL injection. The …