Please turn on your JavaScript for this page to function normally.
Conference on Mobile and Wireless Security Announced

MIS Training Institute announced that The Conference on Mobile and Wireless Security will be held in Chicago, IL, September 23-25, 2003, with optional workshops on September …

Aladdin Knowledge Systems launches new advanced anti-spam service

Aladdin Knowledge Systems announced its collaboration with Cobion, technology leader in content security software, and the launching of a new Advanced Anti-spam Service …

Outsourcing – Potential Security Nightmare?

The outsourcing graveyard is littered with companies that “almost’ took the plunge. A recent case in point involves a major British performance-car manufacturer …

Interview with Kevin Day, author of “Inside the Security Mind: Making the Tough Decisions”

Who is Kevin Day? Introduce yourself to our readers. I grew up in Northern California, as the son of an early programmer I held a pacifier in one hand and a keyboard in the …

Why Managed Security Services are so Popular in Financial Institutions

‘Managed Security Services’ seems to be one of the new buzzwords in the ICT sector. When signing up with a Managed Security Service Provider (MSSP), this company …

Basic Security Measures for FreeBSD

Introduction This document will describe the basic security measures that should be applied to a FreeBSD 4.x workstation. Mostly all of these measures should be applied in a …

Building and Implementing a Successful Information Security Policy

The purpose of this paper is to outline the strategies and managing processes behind implementing a successful Security Policy. Additionally, I will give recommendations for …

Firebox SOHO 6 Wireless Security Product Line Announced

WatchGuard Technologies, Inc., today announced the new Firebox SOHO 6 Wireless product line. Featuring an integrated 802.11b Wireless Access Point, 4-port LAN 10/100 switch …

Sybari Releases Antigen 7.0 for Domino

Sybari Software, Inc., today announced that Antigen 7.0 for Lotus Domino is shipping and available. According to the media release, this new version of Antigen for Domino will …

Security Efforts for Data In Motion Should Be Put to Rest

Everybody knows that it is easier to hit a stationary target than a fast-moving target. Yet, an enormous amount of resources are being used to encrypt data in motion, while …

Intrusion detection

A computer system should provide confidentiality, integrity and assurance against intrusion attempts. However, due to increased connectivity on the Internet, more and more …

Teaching How To Create Malicious Code

In universities around the world, a question has arisen about computer studies syllabuses: should students be taught how to create viruses and malicious code? There are …

Don't miss

Cybersecurity news