Please turn on your JavaScript for this page to function normally.
(ISC)2 Press Announces Inaugural Issue of Information Systems Security, The (ISC)2 Journal

VIENNA, Virginia March 16, 2004 The International Information Systems Security Certification Consortium (ISC)2®, a non-profit international leader in training, qualifying and …

Wanadoo Forges Alliance With Panda Software to Offer Clients Antivirus Protection and Advanced Security Options

Clients of the Internet access and online service provider can now protect their computers with Panda solutions and access the most useful security content provided by the …

Cherry Corporation Increases Security in SAP With Biometric Fingerprint Access

realtime North America, Inc. (www.realtimenorthamerica.com) has announced that The Cherry Corporation has installed realtime?s bioLock, the first and only SAP certified finger …

Advanced Heuristics Technology Discovered and Stopped Latest Computer Worm

SAN DIEGO, CA — Eset Software, a leading worldwide provider of antivirus and Internet security software, announced the detection and elimination of the Win32/Sober.D, …

Diversinet and Guangdong CA Team to Accelerate China’s Secure Mobile Application Market

TORONTO, Canada, March 16, 2004 – Diversinet Corp. (OTCBB: DVNTF), a leading provider of secured mobile solutions, and Guangdong Electronic Certification Authority …

Mitigating the Complexities of Security Management

Securing your enterprise IT infrastructure can be a complex task. If your computing environment is like most, it is heterogeneous and contains a number of security products …

Encryption Framework for Enterprises v 3.3 Red Hat Ready

KANSAS CITY – March 15, 2004 – ERUCES Inc., the leading developer of high volume encryption solutions today announced that the Encryption Framework for Enterprises …

Creating Secure Backups With GnuPG

I’m working for a relatively large Internet Presence Provider (IPP) that servs about 4000 clients from about 30 countries worldwide. Besides a chunk of e-mails to our …

Weekly Report on Viruses and Intrusions – Six Netsky Variants, Nachi, Baglem Sober and StarKeylog

Today’s report will look at six variants of Netsky, two of Nachi and Bagle, the D variant of Sober, the Cidra.B Trojan and the hacking tool, StarKeylog.A. The H, I, J, …

Vontu To Host Webcast To Help Executives Understand The Implications of California’s SB-1 Legislation

SAN FRANCISCO, CA – MARCH 11, 2004 – Vontu, Inc., will host a webcast to help executives understand the implications of California’s SB-1 legislation (also …

SCB Solutions, Inc. to Launch a New Range of Applications for “Smart Cards and Beyond”

Arlington, VA – March 9, 2004 – SCB Solutions, Inc. deploys a family of products to meet the need for integrated smart card applications in enterprise, healthcare …

Citadel Security Software Joins The Cyber Security Industry Alliance

Washington, D.C. – March 11, 2004 – The Cyber Security Industry Alliance, a non-profit organization launched last month by a dozen innovative security software, …

Don't miss

Cybersecurity news