Help Net Security
Meetinghouse Joins the Wi-Fi Alliance
AEGIS Security Solution Wi-Fi Certified PORTSMOUTH, NH, June 16, 2003 – Meetinghouse, a leading developer of network authentication software for wired and wireless …
Intrusion Inc. Sets New Benchmark for Network IDS Simplicity and Manageability
RICHARDSON, Texas–(BUSINESS WIRE)–June 17, 2003– Intrusion SecureNet WBI 2.0 Encapsulates All Network IDS Sensor Functions into an Easy-to-Use Web Browser …
Building and Implementing a Successful Information Security Policy
The purpose of this paper is to outline the strategies and managing processes behind implementing a successful Security Policy. Additionally, I will give recommendations for …
Security Guide for ISPs Providing Windows-based Shared Hosting Services”
London, 13 June 2003 Security company DDPlus (www.ddplus.net) has released a security guide containing a solution for long-standing security problems faced by ISPs currently …
NetScreen Extends Certifications To Include Important Worldwide Government Evaluation Standard
GUILDFORD, U.K., June 17, 2003—NetScreen Technologies, Inc. (Nasdaq: NSCN) has announced that its purpose-built, integrated firewall and virtual private network (VPN) …
Central Command Offers Existing RAV Antivirus Customers A Twenty Five Percent Discount To Upgrade To Vexira Antivirus Solutions
Microsoft Corp. pending acquisition of RAV Antivirus technology raises concerns from existing RAV Antivirus customers, especially Linux customers MEDINA, Ohio June 13, 2003 …
Ibas and HP Join Forces – Leading the Way in Reliable Erasing of Sensitive Data
Ibas and HP Norway have entered into a collaboration agreement to ensure reliable erasing of data on computer servers, and now offer software that allows customers to do the …
Finnish Parliament switches to F-Secure Anti-Virus
Helsinki, Finland, June 15, 2003 – F-Secure Corporation (HEX: FSC) has been chosen the supplier of antivirus products by the Finnish Parliament. According to a recent …
Security Efforts for Data In Motion Should Be Put to Rest
Everybody knows that it is easier to hit a stationary target than a fast-moving target. Yet, an enormous amount of resources are being used to encrypt data in motion, while …
Special Edition Using Windows XP Professional, Bestseller Edition
In the information era, the number of improvements in operating systems grows rapidly. Fighting with our time, working all day, we spend hours and hours learning to cope with …
Panda Spots a New Damaging Worm “Trile”
The Virus Laboratory at Panda Software, leading antivirus developer, has detected the appearance of a new worm called Trile (W32/Trile). This malicious code has the ability to …
Featured news
Resources
Don't miss
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace