Please turn on your JavaScript for this page to function normally.
Red Hat Linux 9 has been released

Red Hat, Inc. announced the availability of Red Hat Linux 9. Drawing from the work of the open source community, Red Hat Linux 9 allows users to take advantage of the newest …

The Case For Secure Email

It may not be surprising for you to learn that email is not a secure medium of communication; however, it may surprise you to learn just how inherently insecure it really is …

Interview with Lisa Yeo, author of “Personal Firewalls for Administrators and Remote Users”

Lisa Yeo is a systems analyst with the Legislative Assembly Office in Edmonton, Alberta, Canada. Her start in security came in 1997 when she was made responsible for managing …

How to Secure your Teleworkers with a VPN

Today’s enterprise is increasingly becoming a distributed workplace made up of branch offices, telecommuters, after-hour workers, contractors, business partners and …

White Hat Security “Hacking Web Applications” Training

White Hat Security announced a two day training session, dealing with topics related to hacking Web applications. The course, that will be held on April 7/8 in Santa Clara …

Reactivity XML Firewall Tackles Costs of Securing XML

Reactivity, Inc. recently introduced Reactivity XML Firewall, a network security appliance designed to protect new-generation applications, while tackling the operating costs …

Spam Checklist – April Fool’s Day is Approaching

As April Fool’s day is less then a week away, filtering company Clearswift is advising organizations to take great care of spam emails that traditionally use this day as …

Protect Your PC For Free! No More Excuses!

With the resurgence of several email viruses and the proliferation of new ones, not to mention a host of new security vulnerabilities across several platforms, I thought I …

How to Make Wireless Networks Secure

Organisations are eager to migrate to wireless LANs (WLANs). The demand for WLAN access in the USA has surged dramatically over the past year. Users are clamouring for WLAN …

“How Hackers Discover your Vulnerabilities” Seminar at InfoSecurity Europe

During this year’s InfoSecurity Europe conference, that will be held in London 29.04 – 01.05, Ubizen will provide one-to-one consultancy sessions on the latest …

Interview with Scott Mann, co-author of Linux System Security: The Administrator’s Guide to Open Source Security Tools, 2/e

Who is Scott Mann? I am a computer jockey by profession. I’ve been working with UNIX and TCP/IP for nearly 25 years. Windows for 8 years. I’m also a sometime auto …

Destroying a Cisco Router Network: How a disgruntled employee can do some serious damage

A couple of weeks ago the company I work for went through and did some lay offs in the network group. You know the market isn’t as good as it was back 3 years ago. Well, …

Don't miss

Cybersecurity news