Expert analysis
Gemplus introduces ResIDent
Gemplus launched ResIDent, a smart card-based ID system designed for advanced e-Government programs. ResIDent enables governments to offer more secure, versatile and …
Wireless LAN Security
Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely …
Security Enhanced Linux BETA Available
A fully functioning distribution of Security Enhanced Linux is now available in BETA for community and industry evaluation. The three-CD set is available here. The shipping …
“Untangling Web Services Security” web seminar
On Wednesday, November 20 2002, RSA Security will host a web seminar titled “Untangling Web Services Security”. RSA Security Technical Director of Developer …
The danger of PDAs
PDAs (personal digital assistants), pocket-sized diaries that are becoming increasingly more powerful, can represent a serious threat to corporate security. As PDAs become …
Snort Enterprise Implementation
The purpose of this guide is to document the installation and configuration of a complete Snort enterprise implementation. This guide contains all the necessary information …
Microsoft releases IIS, Windows XP and Windows 2000 security patches
In yet another combo pack, Microsoft released three security bulletins. The bulletins which are labeled from moderate to critical, deal with Internet Information Service …
ActivCard Launches ActivCard Gold 2.2
ActivCard, the leader in IDentity Management software, announced the worldwide availability of ActivCard Gold 2.2 and ActivCard Gold for CAC 2.2, enabling enterprises and U.S. …
Implementing secure web portals with RSA ClearTrust webinar
On Wednesday, November 06 2002, RSA Security and Geisinger Health System will host a web seminar titled “Implementing Secure Web Portals with the RSA ClearTrust …
Network Associates Fights Spam
The McAfee Security division of Network Associates, Inc. announced a new initiative to combat spam through increased education, awareness, and technology, expanding upon the …
The IP Smart Spoofing
This paper describes a new technique for spoofing an IP address with any networking application. IP spoofing is not new and various hacking tools have been developed to …
Check Point VPN-1/FireWall-1 added to Computer History Museum
Check Point VPN-1/FireWall-1 was presented to the Computer History Museum during a recent visit to the museum by Check Point’s executives. Established in 1996, the …
Featured news
Resources
Don't miss
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites
- Black Friday 2025 for InfoSec: How to spot real value and avoid the noise