Expert analysis
Information Security Excellence Awards Winners Announced
Information Security Magazine announced this years’ winners of prestige Information Security Excellence Awards. Winners were chosen to represent 10 different thematic …
A practical approach for defeating Nmap OS-Fingerprinting
Remote OS Fingerprinting is becoming more and more important, not only for security pen-testers, but for the black-hat. Just because Nmap is getting popularity as the tool for …
Tripwire Security Seminars in March 2003
During March, Tripwire is holding several product and security related web seminars. You can register for them through Tripwire Events page at . These are some of the most …
IBM has released 6 new prep tutorials for DB2 Certification
The new tutorials will teach you the basics of the DB2 products and tools, DB2 security, and much more. You need to make a FREE registration to view the tutorials. Here they …
Interview with Carlisle Adams, Senior Cryptographer and Principal of Security at Entrust, Inc.
Carlisle Adams is recognized internationally for his many contributions to the design, specification, and standardization of public-key infrastructures. He is senior …
Guardian Digital Releases Open Source Secure Mail Suite
Guardian Digital, company well known in the security field for the LinuxSecurity.com web site and EnGarde Secure Linux product line, announced the release of the first secure …
Security Planning Best Practices
When we begin to plan how best to protect our systems and organizations from intruders, it helps to think of those who maliciously attack the security of our organizations as …
Interview with Eric Greenberg, author of “Mission-Critical Security Planner: When Hackers Won’t Take No for an Answer”
Who is Eric Greenberg? I’ve been kicking around the Internet for quite a while. Around 1981, while in college, I worked at the National Institutes of Health as a …
Interview with Aviel Rubin, Computer Science Professor at Johns Hopkins University and Technical Director of the JHU Information Security Institute
Introduce yourself. My name is Avi Rubin. I am a Computer Science Professor at Johns Hopkins University and Technical Director of the JHU Information Security Institute. I …
Newly Released FirewallAnalyzer 3.0 Supports Leading Firewalls
eIQnetworks, Inc., developers of eIQ Analytics Product Series, announced version 3.0 of their FirewallAnalyzer. This tool is the industry’s first browser-based, …
Corporate Security
Corporate security is an important issue for every company, no matter how large or small. However, the nature and focus of corporate security have changed dramatically in the …
Interview with Cyrus Peikari, CEO of AirScanner Mobile Security
Dr. Peikari is the CEO of AirScanner Mobile Security and co-author of the book “Maximum Wireless Security” from SAMS Publishing. He finished his formal training …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)