Please turn on your JavaScript for this page to function normally.
80% of Network Attacks Avoidable with Intrusion Prevention Technology, Reveals Study of Interxion’s Network

Research proves enterprise need for proactive managed security services Interxion, Europe’s largest provider of carrier-neutral data centers and managed services, has …

GeCAD’s Antivirus Technology to be Acquired by Microsoft

Major Recognition of the Romanian I.T. talent Bucharest, June 10, 2003 – GeCAD Software has announced a definitive agreement with Microsoft Corp., of Redmond, Wash., …

Panda Software Welcomes Microsoft Initiatives For Improved Computer Security

MADRID, SPAIN – June 11, 2003 – Multinational antivirus leader Panda Software reacted affirmatively to Microsoft’s acquisition of GeCAD software today, which …

Rosco Lowers Total Cost Of Ownership For Smart Card Issuers

Brighton, June 10th, 2003 – Microexpert announced today the formal launch of Rosco, a remote Smart Card /Token control system. This innovative new solution enables Smart …

Trapeze Networks Raises $34 Million in Up Round

Oak Investment Partners leads the Series B round with a $12 million investment PLEASANTON, Calif. – June 11, 2003 – In one of the largest single rounds of private …

Indicii Salus Backs eSecurity for Britain

11 June 2003- eSecurity for Britain, the online security awareness campaign, announced today that Indicii Salus is joining the dozens of companies providing expert advice, …

Network Associates’ McAfee SpamKiller Dominates Consumer Anti-Spam Space with Over 90% Retail Market Share

Award-Winning Anti-Spam Solution Emerges as the Tool of Choice for Users to Prevent Email Spam From Polluting Their Inboxes SANTA CLARA, Calif., June 11 /PRNewswire-FirstCall/ …

Intrusion detection

A computer system should provide confidentiality, integrity and assurance against intrusion attempts. However, due to increased connectivity on the Internet, more and more …

Oracle Performance Tuning

Writing a good Oracle performance tuning book involves a lot of time and effort. To us, as readers, this book will offer a good fundamental knowledge and serve as a good lead …

Teaching How To Create Malicious Code

In universities around the world, a question has arisen about computer studies syllabuses: should students be taught how to create viruses and malicious code? There are …

IBM ISV Trustix Strengthens UK Team

Paul Walker joins Trustix as Technical Sales Manager for the UK London, UK – 10th June 2003: Trustix (www.trustix.com), Norwegian turnkey Linux security and …

Online Credit Card Transactions Go Mobile

Arcot Systems and Diversinet partner to develop mobile authentication for online credit card transactions SANTA CLARA, California and TORONTO, Canada – June 9, 2003 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools