Help Net Security
Whose Site is it Anyway?
Despite the rapid increase in online commerce, it is estimated that some 85% of transactions are still cancelled at the final ‘confirm and buy’ page. While some of …
The Layered Approach to Security is Dead… Long Live Layered Security
Life isn’t the same as it used to be, the good old days of leaving your door unlocked are gone, never to return. Business isn’t the same either. IT has brought …
Securify Lands $15 Million In Oversubscribed Round
CUPERTINO, Calif., March 24, 2004 – Securify, Inc., a leading provider of network security management software, today announced it has closed $15 million in financing in …
Memory Experts International Secures OEM Agreement With SAFLINK
Montreal, Quebec & Bellevue, WA – March 23, 2004 – Memory Experts International (MXI), a leading manufacturer of secure, portable data storage devices, has …
Meru Networks and iPolicy Networks to Provide Unified Security for WLANs
SUNNYVALE, Calif. March 22, 2004 Meru Networks, a leading provider of large scale wireless LAN (WLAN) infrastructure, and iPolicy Networks, the provider of unified network …
Vigilar Adds Legra Systems’ Switching Suite to its Best-Of-Breed Wireless LAN Solutions
ATLANTA, March 22, 2004 – Vigilar, Inc. today announced a partnership with secure wireless LAN solution provider Legra Systems that will deliver Vigilar’s …
One In Three Large Businesses In The UK Had Their Websites Attacked By Hackers Last Year, Survey Shows
One in three of the UK’s larger companies suffered hacking attempts on their websites in the last year, a new survey shows. Although businesses are confident their …
Meta Group Confirms Proxy Appliances Warranted For Web Control in Most Organizations
SUNNYVALE, Calif., Mar. 22, 2004 — Blue Coatâ„? Systems, Inc. (Nasdaq: BCSI), a leading provider of proxy appliances, today announced that a recently published META …
VoIP – Vulnerability over Internet Protocol
During the past few years the two most significant focuses for remaining IT budget have been security and cost saving systems capable of demonstrating rapid ROI. But in almost …
Thawte Announces New Website With Improved Purchase Functionality
thawte consulting (pty) ltd, the second largest Certification Authority worldwide, has just launched a new website. This new website www.thawte.com includes easy navigation, …
Weekly Report on Viruses and Intrusions – Five Bagle and Two of Netsky Worm Variants
The first variants of Bagle we’ll look at -O and N- share the following characteristics: – They spread via e-mail in a message with variable characteristics, which …
The Ultimate Windows Server 2003 System Administrator’s Guide
This book is a comprehensive guide. It covers fundamentals of Windows Server 2003 which are inherited from Windows 2000 administration. It brings details of planning, …
Featured news
Resources
Don't miss
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
- Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks