Please turn on your JavaScript for this page to function normally.
Wireless Security Threats

The security of wireless networks has been a constant topic in the news during the past few months. You’ve probably heard of terms like wardriving, warchalking and …

NetScreen opens new EMEA offices

NetScreen Technologies, Inc., one of the leading developers of integrated network security solutions, announced at RSA Conference 2002 Europe that they have opened a number of …

RSA Conference 2002 – The Exhibitors

This year’s RSA Conference features 2900 square meters of exhibit space and more than 60 vendors displaying their products. As with any conference, some of the vendors …

RSA Conference 2002 Grand Opening

The first day of the RSA Conference is behind us. As we mentioned earlier, Monday was tutorial day and was divided into two areas: developer and enterprise tutorials. The …

News from the RSA Security press conference

This afternoon RSA Security held a press conference where they informed the public of some new partnerships and products. One of the new releases is RSA Clear Trust 5.0. This …

Microsoft CTO talks about security and open source. What security?

It’s been quite a speech, the one delivered by Craig Mundie – Senior Vice President and CTO Advanced Strategies and Policy here at the RSA Conference in Paris. …

RSA Conference 2002 Paris – Tutorial day

Monday, 7 October 2002 – Today is the first day of the RSA Conference here at Le Palais des Congrès in Paris. This first day is dedicated to the tutorials. They are …

Interview with Jon Callas, CTO of PGP Corporation

Jon Callas is an innovator and an acknowledged expert in all major aspects of contemporary business security, including cryptography, operating system security, public key …

Interview with Roderick W. Smith, Author of “Advanced Linux Networking”

Roderick W. Smith is a professional computer book author who has extensive experience writing handbooks for users. A Linux and networking expert, he has several books to his …

A Note on Proactive Password Checking

Nowadays, proactive password checking algorithms are based on the philosophy of the dictionary attack, and they often fail to prevent some weak passwords with low entropy. In …

OWASP Guide to Building Secure Web Applications version 1.1

The Guide covers various web application security topics from architecture to preventing attack specifics like cross site scripting, cookie poisoning and SQL injection. The …

Interview with Marcel Gagne, President of Salmar Consulting, Inc.

Marcel Gagné is President of Salmar Consulting, Inc., a company that specializes in UNIX/Linux systems and network integration. Over the years, as a systems and network …

Don't miss

Cybersecurity news