Please turn on your JavaScript for this page to function normally.
Interview with Eric Greenberg, author of “Mission-Critical Security Planner: When Hackers Won’t Take No for an Answer”

Who is Eric Greenberg? I’ve been kicking around the Internet for quite a while. Around 1981, while in college, I worked at the National Institutes of Health as a …

Interview with Aviel Rubin, Computer Science Professor at Johns Hopkins University and Technical Director of the JHU Information Security Institute

Introduce yourself. My name is Avi Rubin. I am a Computer Science Professor at Johns Hopkins University and Technical Director of the JHU Information Security Institute. I …

Newly Released FirewallAnalyzer 3.0 Supports Leading Firewalls

eIQnetworks, Inc., developers of eIQ Analytics Product Series, announced version 3.0 of their FirewallAnalyzer. This tool is the industry’s first browser-based, …

Corporate Security

Corporate security is an important issue for every company, no matter how large or small. However, the nature and focus of corporate security have changed dramatically in the …

Interview with Cyrus Peikari, CEO of AirScanner Mobile Security

Dr. Peikari is the CEO of AirScanner Mobile Security and co-author of the book “Maximum Wireless Security” from SAMS Publishing. He finished his formal training …

First Honeyd Challenge – Test Your Programming Skills

Honeyd is a virtual honeypot running as a small daemon to create virtual hosts on a network. The hosts can be configured to run arbitrary services and their personality can be …

New OpenSSL Security and Bugfix Releases

The OpenSSL announced the release of version 0.9.7a of their open source toolkit for SSL/TLS. This new OpenSSL version is a security and bugfix release and incorporates at …

Interview with Judy Novak, co-author of “Network Intrusion Detection 3/e”

Introduce yourself. I’m currently a senior security analyst for a consulting firm – Jacob and Sundstrom, but I’ll be changing jobs in about a month to become …

Trustix Secure Linux 2.0 Technology Preview 2 Released

Trustix team announced that Trustix Secure Linux 2.0 Techology Preview 2 (aka Forecast) is available for download. As this is a technology preview, it is not intended for …

Interview with Ed Skoudis, author of “Counter Hack”

Introduce yourself. Hello. This is Ed Skoudis, security geek. How did you get interested in computer security? I’ve always loved to tear things apart. As a child, I …

Interview with Adam N. Bosnian, Vice President, Sales and Marketing of Elron Software

Adam N. Bosnian joined Elron Software in May 2000. Bosnian brings a strong background in sales, strategy development, corporate partnering, marketing communications, product …

Interview with Martin Croome, European General Manager of Socket Communications

Mr. Croome has held technical and marketing positions within the IT industry for the last 15 years including 11 years with Hewlett Packard in a number of different business …

Don't miss

Cybersecurity news