Help Net Security
Hackproofing DB2
The main points of this presentation are: The state of DB2 security Secure configuration of DB2 Securing DB2 in a Web application Database vulnerabilities Download the …
Astaro Unveils Configuration Manager for Management of Security Policies Across Multiple Network Security Devices
BURLINGTON, Mass. – December 9, 2003 – Astaro (www.astaro.com), makers of the popular Astaro Security Linux, an all-in-one Internet security software appliance, …
Pointsec Wins Contract Worth 1.2m Euros from AstraZenenca to Secure Their Mobile Devices
AstraZeneca, one of the world’s leading pharmaceutical companies have awarded Pointsec Mobile Technologies a global contract worth 1.2m Euros in license fees to secure …
Symmetricom Announces Domain Time II Audit Server
Santa Rosa, CA – December 9, 2003 – Symmetricom (Nasdaq: SYMM), a leading worldwide supplier of atomic clocks and network synchronization and timing solutions, …
Remote Hot Spot – The Market For SSL VPNs Catches Fire
Welcome to the world of Secure Sockets Layer (SSL) Virtual Private Networks (VPNS), the hottest of hotspots in town, fuelled by the surge towards more remote working for …
Excedent Appoints Kevin Minnick, VP of Product Development
Vienna, Virginia (December 8, 2003) – Excedent Technologies, the leader in managed email hosting and security threat prevention for service providers, today announced …
Online Shopping and Spam Floods Before Christmas
Boston, Mass. – December 8, 2003 – Cobion, a content security provider for e-mail and URL blocking has seen an extensive rise in the number of Internet hosts …
Panda Software and Europe Online (EOL) Team Up Against Viruses and Intruders
Panda Software and Europe Online (EOL) have formed a key alliance which will give all the users of the premiere satellite broadband provider an exclusive antivirus channel and …
GFI Network Server Monitor Keeps Servers Up and Running
London, UK, 4 December 2003 – GFI today introduced GFI Network Server Monitor, a tool that automatically monitors the network and servers for failures, and allows …
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
Network intrusion detection systems have become one of several invaluable tools to safeguard critical infrastructure and information. Publicly available network intrusion …
Corestreet and nCipher Develop Integrated Real-Time Digital Credentials Validation Solution
nCipher plc (LSE: NCH) a leading provider of cryptographic IT security and CoreStreet, a leading provider of validation and authorization technology, today announced a …
Bluesocket Ships WG-5000 Wireless Gateway
San Jose, California–Wi-Fi Planet Exposition December 3, 2003. (Booth 319) Bluesocket, the leading vendor of open-systems Wireless Local Area Network (WLAN) management …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised