Expert analysis
Compass Security Finjan SurfinGate Analysis
HTTP content filter technique promises protection at your perimeter infrastructure. While penetrating the clients’ infrastructure during a pen-test job, we are ready to …
Interview with Donald L. Pipkin, Information Security Architect for the Internet Security Division of Hewlett-Packard
Who is Donald L. Pipkin? I am an Information Security Architect at Hewlett-Packard. I’ve been with HP eighteen years; most of that time I have spent in the area of …
RAV AntiVirus fighting spam
Spam has increasingly become a problem on the Internet. Unfortunately, most countries around the world currently have no adequate laws or regulations to control it. It is a …
PKWARE and RSA Security Enter a Strategic Alliance
Bringing together PKWARE’s ZIP compression technology and RSA BSAFE encryption technology, the two companies will develop and market best-of-breed products that combine …
Interview with Darrell D. Simms, Director of Business and Wireless Product Development at TROY Wireless
Darrell D. Simms is an acknowledged leader in the wireless industry as a technologist. He is a noted evangelist for short distance wireless technologies such as Bluetooth and …
MS SQL Worm Roundup
Slammer (Helkern/Sapphire) is a worm that attempts to exploit vulnerabilities in Microsoft SQL 2000 servers and is causing increased traffic on UDP port 1434. This roundup …
Cross-Site Tracing (XST)
October 23 2002, Microsoft issued a press release describing a new browser/server based protective security measure within of internet explorer 6 sp1. This new feature, dubbed …
Interview with Eugene Kuznetsov, Founder, President and CTO of DataPower Technology Inc.
Eugene Kuznetsov is a technology visionary who has been working to address enterprise XML issues since the late 90s. Kuznetsov founded DataPower Technology, Inc. in 1999 to …
Interview with John Zurawski, Vice President of Sales and Marketing at Authentify
John Zurawski has more than 20 years of experience in computer software, Internet and high technology. He has held prominent positions for the analytical software firm SPSS, …
Astaro Security Linux V4 Announced at LinuxWorld Expo
Today at LinuxWorld Expo, Astaro Corporation announced Astaro Security Linux V4. Astaro Security Linux is an integrated software solution that provides great performance in an …
Detecting Wireless LAN MAC Address Spoofing
An attacker wishing to disrupt a wireless network has a wide arsenal available to them. Many of these tools rely on using a faked MAC address, masquerading as an authorized …
Interview with Scott C. Nevins, President and CEO of Protegrity
Protegrity is a leader in database security software, delivering privacy and protection solutions for mission-critical data stored in databases. Its flagship product …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025