Help Net Security
Building and Implementing a Successful Information Security Policy
The purpose of this paper is to outline the strategies and managing processes behind implementing a successful Security Policy. Additionally, I will give recommendations for …
Security Guide for ISPs Providing Windows-based Shared Hosting Services”
London, 13 June 2003 Security company DDPlus (www.ddplus.net) has released a security guide containing a solution for long-standing security problems faced by ISPs currently …
NetScreen Extends Certifications To Include Important Worldwide Government Evaluation Standard
GUILDFORD, U.K., June 17, 2003—NetScreen Technologies, Inc. (Nasdaq: NSCN) has announced that its purpose-built, integrated firewall and virtual private network (VPN) …
Central Command Offers Existing RAV Antivirus Customers A Twenty Five Percent Discount To Upgrade To Vexira Antivirus Solutions
Microsoft Corp. pending acquisition of RAV Antivirus technology raises concerns from existing RAV Antivirus customers, especially Linux customers MEDINA, Ohio June 13, 2003 …
Ibas and HP Join Forces – Leading the Way in Reliable Erasing of Sensitive Data
Ibas and HP Norway have entered into a collaboration agreement to ensure reliable erasing of data on computer servers, and now offer software that allows customers to do the …
Finnish Parliament switches to F-Secure Anti-Virus
Helsinki, Finland, June 15, 2003 – F-Secure Corporation (HEX: FSC) has been chosen the supplier of antivirus products by the Finnish Parliament. According to a recent …
Security Efforts for Data In Motion Should Be Put to Rest
Everybody knows that it is easier to hit a stationary target than a fast-moving target. Yet, an enormous amount of resources are being used to encrypt data in motion, while …
Special Edition Using Windows XP Professional, Bestseller Edition
In the information era, the number of improvements in operating systems grows rapidly. Fighting with our time, working all day, we spend hours and hours learning to cope with …
Panda Spots a New Damaging Worm “Trile”
The Virus Laboratory at Panda Software, leading antivirus developer, has detected the appearance of a new worm called Trile (W32/Trile). This malicious code has the ability to …
Weekly Virus Report – Mapson, Lentin.R and Naco.F Worms
Madrid, June 13, 2003 – This week’s virus report will focus on three worms Mapson (W32/Mapson), Lentin.R (W32/Lentin.R) and Naco.F (W32/Naco.F), and a virus/worm …
Trend Micro Only Vendor To Earn Certification For Antivirus Products From National Information Assurance Partnership
Gateway Solution Meets Rigorous Global Standards For Security Products; New Government Guidelines Specify NIAP-Certified IT Products For High Security Installations Cupertino, …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025