Help Net Security
80% of Network Attacks Avoidable with Intrusion Prevention Technology, Reveals Study of Interxion’s Network
Research proves enterprise need for proactive managed security services Interxion, Europe’s largest provider of carrier-neutral data centers and managed services, has …
GeCAD’s Antivirus Technology to be Acquired by Microsoft
Major Recognition of the Romanian I.T. talent Bucharest, June 10, 2003 – GeCAD Software has announced a definitive agreement with Microsoft Corp., of Redmond, Wash., …
Panda Software Welcomes Microsoft Initiatives For Improved Computer Security
MADRID, SPAIN – June 11, 2003 – Multinational antivirus leader Panda Software reacted affirmatively to Microsoft’s acquisition of GeCAD software today, which …
Rosco Lowers Total Cost Of Ownership For Smart Card Issuers
Brighton, June 10th, 2003 – Microexpert announced today the formal launch of Rosco, a remote Smart Card /Token control system. This innovative new solution enables Smart …
Trapeze Networks Raises $34 Million in Up Round
Oak Investment Partners leads the Series B round with a $12 million investment PLEASANTON, Calif. – June 11, 2003 – In one of the largest single rounds of private …
Indicii Salus Backs eSecurity for Britain
11 June 2003- eSecurity for Britain, the online security awareness campaign, announced today that Indicii Salus is joining the dozens of companies providing expert advice, …
Network Associates’ McAfee SpamKiller Dominates Consumer Anti-Spam Space with Over 90% Retail Market Share
Award-Winning Anti-Spam Solution Emerges as the Tool of Choice for Users to Prevent Email Spam From Polluting Their Inboxes SANTA CLARA, Calif., June 11 /PRNewswire-FirstCall/ …
Intrusion detection
A computer system should provide confidentiality, integrity and assurance against intrusion attempts. However, due to increased connectivity on the Internet, more and more …
Oracle Performance Tuning
Writing a good Oracle performance tuning book involves a lot of time and effort. To us, as readers, this book will offer a good fundamental knowledge and serve as a good lead …
Teaching How To Create Malicious Code
In universities around the world, a question has arisen about computer studies syllabuses: should students be taught how to create viruses and malicious code? There are …
IBM ISV Trustix Strengthens UK Team
Paul Walker joins Trustix as Technical Sales Manager for the UK London, UK – 10th June 2003: Trustix (www.trustix.com), Norwegian turnkey Linux security and …
Online Credit Card Transactions Go Mobile
Arcot Systems and Diversinet partner to develop mobile authentication for online credit card transactions SANTA CLARA, California and TORONTO, Canada – June 9, 2003 …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025