Mirko Zorz
Interview with John Chirillo, author of “Hack Attacks Testing: How to Conduct Your Own Security Audit”
Who is John Chirillo? How did you gain interest in computer security? Like most computer enthusiasts I began my career early on. At twelve years old I wrote a game entitled …
Interview with Mark G. Sobell, author of “A Practical Guide to Red Hat Linux 8”
Mark G. Sobell is the author of best-selling UNIX and Linux books: “A Practical Guide to the UNIX System”, “UNIX System V: A Practical Guide”, “A …
LT Auditor+ Security Software Bundled with Novell Netware
Blue Lance announced that a new version of LT Auditor+ has been developed exclusively for Novell and packaged with “Nakoma,” the next official release of NetWare. …
Interview with Sunil James, Manager of iDEFENSE’s Vulnerability Contributor Program
Sunil James manages iDEFENSE’s Vulnerability Contributor Program (VCP). He is a member of the company’s Technical Intelligence team. Sunil joined iDEFENSE in July …
Red Hat Linux 9 has been released
Red Hat, Inc. announced the availability of Red Hat Linux 9. Drawing from the work of the open source community, Red Hat Linux 9 allows users to take advantage of the newest …
Interview with Lisa Yeo, author of “Personal Firewalls for Administrators and Remote Users”
Lisa Yeo is a systems analyst with the Legislative Assembly Office in Edmonton, Alberta, Canada. Her start in security came in 1997 when she was made responsible for managing …
Interview with Scott Mann, co-author of Linux System Security: The Administrator’s Guide to Open Source Security Tools, 2/e
Who is Scott Mann? I am a computer jockey by profession. I’ve been working with UNIX and TCP/IP for nearly 25 years. Windows for 8 years. I’m also a sometime auto …
Interview with Christopher Negus, author of “Red Hat Linux 8 Bible”
Christopher Negus has been working with UNIX systems, the Internet, and (more recently) Linux systems for more than two decades. During that time, Chris worked at AT&T …
Three-Day Virtual Conference on Remote Access, VPN and Web Application Security
Rainbow Technologies announced that a trio of security experts will participate in multiple panel discussions ranging from remote access deployments to virtual private network …
Red Hat Linux 8 Bible
As Linux gains more and more popularity we have books on the subject being published frequently. This is one of the latest books on Red Hat Linux 8 that, as all books do, …
Maximum Security 4/e
When you're about to read a book that already reached its fourth edition, you know you're about to embark on an interesting journey. Since it's debut in 1997, the Maximum …
Interview with Steve Kalman, Managing Director for Esquire Micro Consultants
Who is Steve Kalman? I’ve been in MIS since 1968, when I learned to program in Fortran at Ohio State University. Over the years I’ve been a programmer, systems …
Featured news
Resources
Don't miss
- Security tooling pitfalls for small teams: Cost, complexity, and low ROI
- BloodHound 8.0 debuts with major upgrades in attack path management
- Back to basics webinar: The ecosystem of CIS Security best practices
- SonicWall firewalls targeted in ransomware attacks, possibly via zero-day
- AIBOMs are the new SBOMs: The missing link in AI risk management