Please turn on your JavaScript for this page to function normally.
Diversinet Buys Boston-Based Caradas, Expands Push Into U.S.

Strengthens secure wireless offerings into global finance, government sectors TORONTO, September 9, 2003 – Diversinet Corp. (OTCBB: DVNTF) today announced it has …

Utimaco Lands Anchor Financial Investor and Raises Euro 12.1 Million

Investcorp leads Euro 12.1 million raise to strengthen balance sheet and provide solid basis for growth Oberursel, Germany, September 9, 2003 – Utimaco Safeware, a …

Trend Micro Spam Prevention Service Continues to Block Spam at the Internet Gateway Despite Spam’s Virus-Like Behavior

Enhanced features reduce false positives and give more administrative control over identification of unwanted email Cupertino, California – September 8, 2003 – …

Trend Micro InterScan Web Security Suite Brings High Performance Gateway Protection for Enterprise Customers

First Dedicated HTTP/FTP Security Solution Now Available for Microsoft(tm) Windows(tm) and Solaris(tm) Platforms Cupertino, California – September 8, 2003 – Trend …

Information Security Checklist

Today’s heightened awareness of the need to secure IT infrastructures and protect mission critical data is leading more and more organizations to reevaluate their …

Neoteris Announces Extension Of Access Series To Address Industry Demand For Secure Wireless Mobile Access

Neoteris SSL Access Products Deliver Industry’s Only Truly Clientless Support for Broad Range of Mobile Wireless Applications and Devices, Including Sony …

Blue Coat Introduces ProxySG – Secure Proxy Appliances Control User Communications Over the Web

SUNNYVALE, Calif., Sep. 8 /PRNewswire-FirstCall/ — Blue Coat(TM) Systems, Inc. (Nasdaq: BCSI) today announced the availability of ProxySG(TM), a family of secure proxy …

Blue Coat Integrates SurfControl Filtering Onto Secure Proxy Appliance

SUNNYVALE, Calif., Sep. 8 /PRNewswire-FirstCall/ — Blue Coat(TM) Systems, Inc. (Nasdaq: BCSI) today announced the integration of SurfControl’s (London: SRF, Nasdaq …

“Kerberos: The Definitive Guide” Puts the Network Watchdog On the Prowl

Sebastopol, CA–In Greek mythology, Kerberos (aka Cerberus) was the hound of Hades–a vicious, three-headed dog with a mane of snakes and lion’s claws that …

Protecting Databases

One of the more recent evolutions in network security has been the movement away from protecting the perimeter of the network to protecting data at the source. The reason …

Weekly Virus Report – Blaster.F, Mapson.D, Darby.A, Apdoor.B, Daol.A and Surfbar

Blaster.F, which only infects Windows 2003/XP/2000/NT computers, is a worm that exploits the ‘Buffer Overrun in RPC Interface’ vulnerability to spread to as many …

Prison for computer crime

The Justice Ministers of the 15 Member States of the European Union have decided to modify their country laws, with the aim of including prison sentences for the authors of …

Don't miss

Cybersecurity news