Please turn on your JavaScript for this page to function normally.
Interview with Leo Pluswick and Al Potter, Security Experts from ICSA Labs

What do people in the security industry think of wireless security? Here’s the opinion of two experts – Leo Pluswick and Al Potter, both from ICSA Labs, a division …

Aladdin Knowledge Systems’ eToken Drivers get Microsoft WHQL Certification

The drivers for Aladdin Knowledge Systems’ eToken family of USB authentication tokens were awarded Windows Hardware Quality Labs (WHQL) certification. This gives Windows …

Interview with Eric Janszen, CEO of Bluesocket Inc.

Eric Janszen is the CEO of Bluesocket Inc., a company that manufactures high performance solutions enabling the broad deployment and effective management of WLANs for data and …

O’Reilly releases a book on 802.11 security

802.11 Security by authors Bruce Potter and Bob Fleck gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing …

NT OBJECTives – focusing on securing web services

Recently a new tool for security assessment and defense was announced: The Fire & Water Toolkit – a collection of cohesive, interactive command line tools that …

Security Year in Review: VPNs and Firewalls

With many new and improved products on the market, this has been a good year for designing VPNs and deploying firewalls. Here’s an overview of happenings during 2002 …

Wireless Security and Privacy: Best Practices and Design Techniques

Wireless security is certainly one of this year's hot topics. Everybody is talking about wardriving, warchalking, and so on. This is just the perfect time to release a book …

Security Year in Review: Honeypots

This has been a great year for honeypots, finally this method of collecting security information got its deserved place under the spotlight as more people began to realize the …

Interview with Bob Toxen, Author of “Real World Linux Security”

1. Who is Bob Toxen? I am cut from standard geek material. I love science fiction, especially Star Trek. From the time I was 14 I was hooked on computers. I was introduced to …

Array Networks Delivers Network Traffic Analysis to Protect Intellectual Property and Detect Network Abuse

Array Networks announced the availability of its new Array SR (Security Reconnaissance) Series, the first wire-speed network traffic analyzer designed to detect potential …

Protect your Macintosh with MacScan

SecureMac.com announced the release of their first security application to protect the Macintosh from spyware and applications that could offer remote access when improperly …

Novell releases a new UDDI server

Novell announced the availability to developers of a new Universal Description, Discovery and Integration (UDDI) server that adds secure identity management to the UDDI …

Don't miss

Cybersecurity news