Expert analysis
Interview with Andrew G. Mason, author of “Cisco Secure Virtual Private Networks”
Andrew G. Mason, CCIE #7144, CCDP, CSS-1, is the CEO of three UK-based companies: Mason Technologies, CCStudy.com (resource site for Cisco Certification), and Boxing Orange. …
Centrally Managed Network Security: Hope or Reality?
Ask any IT professional to predict the future of computer networking and you will get different answers. Guessing the future of technology has always been a dicey business at …
Core Security Announces IMPACT 3.0 Penetration Testing Framework
Strategic security solutions developer Core Security Technologies, announced CORE IMPACT 3.0 – the new release of their penetration testing framework. Designed to …
Funk Software Announced Odyssey Secure 802.11 Client for Pocket PC
Wireless LAN security solutions provider Funk Software, recently announced Odyssey Client for Pocket PC. This new version of their 802.1x access client, gives the handheld …
Adobe Acrobat 6.0 Strengthens Electronic Document Security
Adobe Systems is advancing security for electronic documents with the recent release of their Adobe Acrobat product family and Adobe Portable Document Format (PDF). New …
Online Credit and Debit Card Security Report
Independent market analyst Datamonitor, released a new report focused on the situation of online credit and debit card security. E-Commerce payment volumes will continue to …
Linux Security: Kinds of Encryption
This is an excerpt from “A Practical Guide to Red Hat Linux 8“. An interview with the author is available here. Security Security is a major part of the foundation …
PKI… Why Go Through the Hassle?
As e-mail increasingly substitutes the use of letters and faxes (also to governmental bodies) and as commercial transactions on the web get more and more important to …
Interview with Scott Hawkins, author or “Essential Apache for Web Professionals”
Who is Scott Hawkins? I’m a computer geek. I’ve been fascinated with computers since my Dad bought me my first one at the age of 12 (it was a Commodore VIC-20 with …
Implementing Basic Security Measures
Abstract When we talk about implementing basic security measures, one could think “And what are those?” And if that question would be asked, it would be a very, …
RSA Security Launches Developer Central Web Site
RSA Security yesterday announced a grand opening of RSA Developer Central, a new web site concentrated on the content geared towards Information Security software developers. …
Interview with Scott Barman, author of “Writing Information Security Policies”
Who is Scott Barman? Introduce yourself to our readers. I am the author of “Writing Information Security Policies,” a book about the basis of any information …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month