Help Net Security
Audio Interview with Greg Hoglund and Gary McGraw, Authors of “Exploiting Software: How to Break Code”
The authors of the acclaimed “Exploiting Software: How to Break Code” voice their opinion on close source vs. open source security, the most ridiculous mistakes …
NetScreen Positioned in the Leader Quadrant in SSL VPN Magic Quadrant
SUNNYVALE, Calif., April 14, 2004 – NetScreen Technologies, Inc. (Nasdaq: NSCN) today announced it has been recognized in a recently released SSL VPN market research …
Sanctum Hits Record Numbers in Q1 2004, Extending Lead in Application Security Market with 95 Percent Revenue Growth
SANTA CLARA, CALIF.-April 12, 2004-Sanctum, Inc., the established leader in automated Web application security firewall and testing software, today announced its best quarter …
Mail Scanning With Exim And The Exiscan ACL
With all the spam and viruses circulating the Internet these days, any network admin worth his or her salt will have appropriate filters in place to prevent these irritants …
Registration Opens for the 2004 O’Reilly Open Source Convention
Sebastopol, CA–O’Reilly & Associates founder Tim O’Reilly is fond of quoting an Athenian in ancient Greece who said, “The difference between a man …
Spectorsoft Corporation Has Announced That it Has Begun Shipment of Spector Corporate Network Edition
The result provides businesses with the most advanced monitoring software suite ever offered. Now, at the touch of a button, Spector CNE can be remotely configured and …
GFI Releases a Major Upgrade Of Its Acclaimed Network Security Scanner
London, UK, 12 April 2004 – GFI today announced the release of GFI LANguard Network Security Scanner (N.S.S.) 5, a major upgrade of its popular network security scanner. …
O’Reilly Releases “Windows Server Hacks”
Sebastopol, CA–One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity of its administration. The easy-to-use GUI, …
O’Reilly Releases “Network Security Assessment”
Sebastopol, CA–An increasingly popular approach to network security is to think like the bad guys: by understanding the methods and motivations of those who attempt to …
Weekly Report on Viruses and Intrusions – Bugbear.C, Variants S and T of Netsky and Sober.F
Bugbear.C mails itself out to all the addresses it finds in the affected computer’s Outlook Address Book and in files with the following extensions: ODS, MMF, NCH, MBX, …
Netsky-Q Worm Preparing To Blast Websites Off The Net
The Netsky-Q worm (W32/Netsky-Q) is set to launch distributed denial of service attacks against a number of websites as infected computers pass midnight tonight. The worm …
SecureInfo’s RMS Security Compliance Solution First-to-Market with Final Draft of NIST Special Publication 800-37 for Federal Civilian Agencies
SAN ANTONIO, TEXAS – April 6, 2004, SecureInfo Corporation, a recognized leader in delivering enterprise information security solutions, announced today that RMS(tm) …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)