Please turn on your JavaScript for this page to function normally.
Security Designs of SSL VPNs

During the Infosecurity Europe 2004 show, we caught up with William Orme, Senior Technical Consultant at Whale Communications, and talked to him about SSL VPNs. In this audio …

WarDriving: Drive, Detect, Defend, A Guide to Wireless Security

Wardriving is extremely important for the state of wireless security, as it shows how many unprotected WLANs are out there and is therefore directly influencing wireless …

The Certification of SSL VPNs

During the Infosecurity Europe 2004, we caught up with Brian Monkman, Technology Programs Manager at ICSA Labs, and talked to him about SSL VPNs. In this audio session, Mr. …

Biometrics for Network Security

With all the problems related to using simple password-based authentication methods, biometrics surely has major "pros" for its implementation in enterprise networks. Can this …

802.11 Wireless Networks: The Definitive Guide

Despite providing a wealth of extensive in-depth technical pieces of information, which vary from cryptic shorts to descriptions of specific frame parts, the book is very easy …

E-mail Security

In this 6:49 minutes long audio learning session, Joseph Zacharias, Managing Director at Kerio Technologies UK, discusses the major aspects of e-mail security, including viral …

Five Tips on Protecting Your Business Against Spam

In this 4:29 minutes long audio learning session, Warren Sealey, SME Security Manager at Message Labs, discusses the ever growing spam problem, talks about the positive …

Encryption Applied

In this 8:13 minutes long audio learning session, Alex van Someren, Chief Executive Officer at nCipher, talks about the process of encryption, the difference between symmetric …

Digital Certificates Explained

In this 3:43 minutes long audio learning session, Dr. Phillip Hallam-Baker, Principle Scientist and Web Services Security Architect at Verisign, talks about Public Key …

SQL Injection Attacks

SQL injection is a technique for exploiting web applications that use client-supplied data in SQL queries without stripping potentially harmful characters first. Despite being …

HackNotes Network Security Portable Reference

This book is perfectly suited for two different types of readers: those who are working within the Information Security field and need to catch up with some of the most common …

The Benefits of SSL VPNs

Secure Sockets Layer (SSL) Virtual Private Networks are quickly gaining popularity as serious contenders in the remote-access marketplace. Analysts predict that products based …

Don't miss

Cybersecurity news