Help Net Security
Opaserv.F and Opaserv.G Worms Detected
Panda Software’s Virus Laboratory has detected the appearance of two new variants of the Opaserv worm. These new variants, Opaserv.F and Opaserv.G., are very similar to …
ActiveState’s PerlMx Offers Integrated Anti-Spam Solution with McAfee Security Anti-Virus Protection
VANCOUVER, BC — October 21, 2002 — ActiveState Corp., a leader in enterprise anti-spam and email filtering solutions, and Network Associates (NYSE: NET), a leading …
Countering cyber war
For many, the term cyber war conjures up images of deadly, malicious programmes causing computer systems to freeze, weapon systems to fail, thwarting vaunted technological …
Dealing with External Computer Security Incidents
Dealing with computer security incidents is extremely difficult. There are many ways that incidents can occur and many types of impact they can have on an organization. There …
netForensics Unveils the Next Generation of Security Information Management
Advanced SIM Offering Features State-of-the-Art Visualization and Risk Assessment Capabilities WASHINGTON, Oct. 23 /PRNewswire/ — netForensics, Inc., the recognized …
F-Secure Receives World’s First Security Certificate For Windows Powered Mobile Platforms
F-Secure Corporation is the first company in the world to receive United States government validation from National Institute of Standards and Technology for cryptographic …
Cyberguard Firewalls To Protect Major Mideast Telecom
Saudi Telecom Company – Kingdom’s Only Communications Provider – Selects CyberGuard Firewalls To Secure Network Infrastructure Ft. Lauderdale, Fla., and …
Datakey Announces Third Quarter Results
MINNEAPOLIS, Oct. 22, 2002 – Datakey Inc. (Nasdaq: DKEY; www.datakey.com), a trusted developer of smart card solutions for securing e-business, today reported revenue of …
Cisco Systems to Acquire Psionic Software
Software Reduces Network Security False Alarms, Improving Business Productivity and Lowering Costs SAN JOSE, Calif., Oct. 22, 2002 — Cisco Systems, Inc., today announced …
Baltimore Is First To Remove The Cost and Complexity of PKI Security
Baltimore launches Trusted Business Suite putting the emphasis on business applications. LONDON, October 22, 2002: Baltimore Technologies (London:BLM), a leading e-security …
Open Source Digital Forensics Tools: The Legal Argument
This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a tool must be reliable and …
Can you trust your computer?
Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call “trusted …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege