Expert analysis
Host Discovery with nmap
As a Computer Security Engineer that regularly conducts external penetration tests, a recurring challenge seems to arise when assessing organizations with a large allocation …
Vulnerabilities in Microsoft’s Java implementation
Overview Microsoft Internet Explorer comes with Java virtual machine and accompanying class packages. Multiple security vulnerabilities have been found in the Java …
New NetScreen-5XT features increase security for remote sites
NetScreen Technologies, Inc. has announced new features for the NetScreen-5XT that will increase the level of security provided for companies looking needing a secure way of …
Nokia focuses on privacy, mobile Web services and security tools
Nokia introduced tools for managing subscriber privacy, mobile Web service interfaces and presence management enabling operators to enhance the service offering for their …
Sophos Anti-Virus detection: a technical overview
This paper describes the main components of Sophos Anti-Virus and how they relate to each other. It discusses virus scanning, detection methods and the creation of virus …
The problems with Secure Email
Find out why “Silver Bullet” Email security is problematic. Learn to fully protect your data simply and securely while avoiding complex interactions between …
“Keeping Secure – Managing Cyberspace Security Risk” webcast
Date:Wednesday, December 4, 2002 Time:2:00PM EST (U.S.) Speakers:Mark Cox, Senior Director of Engineering Response Team Lead; Brian Faustyn, Red Hat Network Product Manager …
Sony Releases New Fingerprint Identification Unit
Sony’s new fingerprint identification device can serve as the basis for enterprise-wide employee identification solutions in work environments where employee mobility is …
“Enterprise Vulnerability Assessment and Remediation” web seminar
On Tuesday November 12, 2002 eEye will host a web seminar titled “Technical Demonstration: Enterprise Vulnerability Assessment and Remediation”. This Webinar is a …
Honeypot Best Practices security conference
The very first security conference ever dedicated to honeypot technologies is starting today in Las Vegas. Key features and benefits of this event: Hear multiple in depth case …
Nokia and Trend Micro establish a strategic alliance
Nokia, and Trend Micro, announced a Memorandum of Understanding to establish a strategic alliance focused on delivering network-based, best-of-breed content security solutions …
“Wireless Security: A Contradiction in Terms?” web seminar
On Thursday, November 7, 2002, renowned security expert and TruSecure Chief Technical Officer, will host a webinar titled “Wireless Security: A Contradiction in …
Featured news
Resources
Don't miss
- Radio signals could give attackers a foothold inside air-gapped devices
- Product showcase: RoboForm password manager for iOS
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken