Help Net Security
GFI’s Email Security Testing Zone Launches a New Test
Allows admins to test the vulnerability of their networks to the newly found fragmented message vulnerability London, UK, 12 September 2002 – GFI’s Email Security …
US. Government Customer Expands Deployment Of Datakey Smart Card Technology
MINNEAPOLIS, Sept. 11, 2002 – Datakey Inc. (Nasdaq: DKEY; www.datakey.com), a trusted developer of smart card solutions for securing enterprise-wide personal …
Sophos: September 11th Worm is a Distasteful Attempt
Sophos, a world leader in corporate anti-virus protection, has received several reports from computer users concerned about the brand new Chet worm (W32/Chet-A), an email …
F-Secure Informs About a 9/11 Themed Worm
F-Secure Corporation informs that it has received copies of a new Windows e-mail worm called “Chet”. This worm is themed around the September 11th terrorist …
We Will Find the Way …
Article by: Dr Anton Zajac – VP, Eset SoftwareCourtesy of Virus Bulletin When Hannibal led his troops through the freezing peaks of the snow-covered Alps, he declared: …
Identix Fingerprint Technology Adopted by Several Major Healthcare
Institution As HIPAA Deadline Approaches, More Hospitals and Clinics Move To Comply With Privacy Requirements MINNETONKA, Minn., Sept. 9 /PRNewswire-FirstCall/ — Identix …
Astaro Content Filtering Process
Traditional Internet filtering methods depend on manually compiled blocking lists, individual ratings or online applied heuristics algorithms. These methods are, for the most …
Check Point Software Unveils New SmartLSM
First Solution to Enable Simple VPN/Security Deployment and Management for Up to One Thousand Franchise Locations REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point …
Research Firm Recognizes Check Point as VPN Market Leader
Leader Position Based on Ability to Execute and Completeness of Vision REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point Software Technologies Ltd. (Nasdaq: CHKP), the …
Check Point Software And Internet Security Systems Secure Networld+Interop and COMDEX Event Network
Check Point and ISS Provide Integrated Security Framework with Best-of-Breed Technology for Largest Short-Term Network REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point …
Baltimore Technologies Plc Announces Restructuring Close to Completion and Half-Year Results in Line with Expectations for 6 Months Ended June 30 2002
London, UK – September 10, 2002 – Baltimore Technologies (London:BLM), (“Baltimore”) today announced its interim results for the six months ended 30 …
The Weakest Link in Disaster Recovery
Much of the focus of disaster recovery planning is on creating redundant data sites and backup tapes. Very often, a crucial component is overlooked: that of keeping current …
Featured news
Resources
Don't miss
- Product showcase: Secure digital and physical access with the Swissbit iShield Key 2
- Trojanized KeePass opens doors for ransomware attackers
- Closing security gaps in multi-cloud and SaaS environments
- Containers are just processes: The illusion of namespace security
- Why legal must lead on AI governance before it’s too late