Expert analysis
Tips for Safe Holiday Online Purchasing
While the shopping frenzy is at its all-year high, Network Associates’ business unit McAfee launched an educational campaign called Safe Holiday Online Purchasing …
Strengthening Security for Small Businesses With Safe@ 3.0
SofaWare Technologies launched Safe@ 3.0, bringing enterprise-class security to the small businesses and consumers. The complete suite of Safe@ solutions, including Safe@Home, …
NT OBJECTives – focusing on securing web services
Recently a new tool for security assessment and defense was announced: The Fire & Water Toolkit – a collection of cohesive, interactive command line tools that …
Internet Cleanup 3.0 Protects Your Privacy
Aladdin Systems, Inc. (not to be confused with Aladdin Knowledge Systems) announced a new version of Internet Cleanup, software recently acquired from Kroll Ontrack. Internet …
Session Fixation Vulnerability in Web-based Applications
Many web-based applications employ some kind of session management to create a user-friendly environment. Sessions are stored on server and associated with respective users by …
Ubizen on E-Business Security
At this year’s RSA Conference 2002 Paris, we met with people from the European security company Ubizen. We talked with Carlo Sch??pp, Executive Vice President Ubizen …
Security Year in Review: VPNs and Firewalls
With many new and improved products on the market, this has been a good year for designing VPNs and deploying firewalls. Here’s an overview of happenings during 2002 …
Protecting Port 80 with “Security Gateway”
Blue Coat Systems is a developer of Web security appliances which are the industry’s first dedicated port 80 security solutions. If the name Blue Coat Systems …
Backup Securely with Backup Professional
While attending the RSA Conference 2002, held this October in Paris, we had the opportunity to talk with Roy Davies, Director of Corporate Affairs at Attix5. Founded in South …
Security Year in Review: Honeypots
This has been a great year for honeypots, finally this method of collecting security information got its deserved place under the spotlight as more people began to realize the …
Interview with Bob Toxen, Author of “Real World Linux Security”
1. Who is Bob Toxen? I am cut from standard geek material. I love science fiction, especially Star Trek. From the time I was 14 I was hooked on computers. I was introduced to …
Array Networks Delivers Network Traffic Analysis to Protect Intellectual Property and Detect Network Abuse
Array Networks announced the availability of its new Array SR (Security Reconnaissance) Series, the first wire-speed network traffic analyzer designed to detect potential …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month