Mirko Zorz
Interview with Rafeeq Ur Rehman, author of “Intrusion Detection with SNORT”
Who is Rafeeq Ur Rehman? Introduce yourself to our readers. I am working as Managing Consultant at Dedicated Technologies Inc. where we provide services related to enterprise …
Mastering Red Hat Linux 9
Here it is again, another book dedicated to Red Hat Linux. As a fan of the operating system I jumped right on it to see what it can offer compared to the other books on the …
AirDefense launches solution to secure and support wireless LANs with 24×7 monitoring for rogue detection & policy enforcement
AirDefense introduced its AirDefense Guard 1120 as an entry-level solution to provide the highest level of security and support for enterprise wireless LANs at an affordable …
Build Your Own Server
I've had the pleasure of reading several books that build system administration skills essential for successfully managing a system. This time I went through a title that …
Sony alerts consumers of fraudulent spam e-mail
Sony Electronics reported that it has become aware of an unauthorized and deceptive spam e-mail that has been sent to consumers with the subject title “Sonystyle user …
Interview with Brian Hatch, author of “Hacking Exposed Linux”
Who is Brian Hatch? Introduce yourself to our readers. Brian Hatch is a hacker in the positive sense – a coder, tinkerer, and tester. I love to prod software into doing …
Aladdin Knowledge Systems launches new advanced anti-spam service
Aladdin Knowledge Systems announced its collaboration with Cobion, technology leader in content security software, and the launching of a new Advanced Anti-spam Service …
Interview with Kevin Day, author of “Inside the Security Mind: Making the Tough Decisions”
Who is Kevin Day? Introduce yourself to our readers. I grew up in Northern California, as the son of an early programmer I held a pacifier in one hand and a keyboard in the …
The Practice of Network Security: Deployment Strategies for Production Environments
Last year in an interview for ZDNet, computer security expert Bruce Schneier said: "I think we're finally past the era where people believe in magic security dust, that all …
Red Hat Linux Survival Guide
Red Hat Linux is by far the most popular Linux distribution and therefore many books cover it in great detail. This time I went through a book that's not massive in size as …
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks 2/e
IPSec is short for IP Security, a set of protocols developed by the Internet Engineering Task Force, is used to secure exchange of packets at the IP layer. If you're …
Interview with Dave Wreski, Founder and CEO of Guardian Digital
Dave Wreski is the founder and CEO of Guardian Digital, which he formed in May 1999 to solve the mounting security issues related to enterprises world-wide. With his vast …
Featured news
Resources
Don't miss
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites
- Black Friday 2025 for InfoSec: How to spot real value and avoid the noise