Patrick Sweeney, VP Product Management and Corporate Marketing presents on February 17 at RSA 2011 in San Francisco.
Acquisitions and Record Growth in 2010
Last year was exceptionally successful for us: Astaro as a company grew over 30% during 2010 and more than 50% in the fourth quarter. This we did not accomplish on our own, as it is the continuous support and engagement of our partners that has brought us this far, and we highly appreciate it
Tips for providing (hopefully) secure access to web application servers
Last week we discussed why retail organizations must consider web application security when hosting an ecommerce site. Now I would like to provide some tips on how to provide secure access to web application servers. Layered Defense Firewalls and IPS systems still have their place and can help guard against simple exploits and Denial of Service attacks.
From Bedroom to Underground – The Evolution of Hackers
In its original meaning, the term “hack” stood for the re-configuring or re-programming of a system so it worked in ways not meant by the owner, administrator, or designer. More generally, a hack is a quick and clever solution to a problem. One of today’s most famous pieces of malware inherited its name from an invention that could be considered the very first hack: The Trojan Horse that was created by the Greeks to breach the impregnable Trojan city walls.
Think Before You Click
Scott Pinzon, CISSP, hosts interview clips where world-renowned Internet security experts explain how spyware works. Perfect for helping non-technical users understand the damage one errant click can cause.
Internet Explorer VML Exploit Revealed
Network security analyst Corey Nachreiner, CISSP, demonstrates how a zero-day security vulnerability in Internet Explorer can be exploited.
What Is a Sidejacking Attack?
Corey Nachreiner, CISSP, demonstrates how someone sitting near you at a wireless hotspot can steal your credentials for any Web account you log into…
Astaro RED Earns IT Product Of the Year 2010 Award
Computerworld, a leading Czech IT publication, recently made a list of the best new products to hit the IT security space this year with their 2010 round-up.
The Best Security Suites for 2011
The latest edition of Astaro Security Gateway, version 8, has already been recognized by PC Magazine as one of the best security suites for home users in 2011. Our home use firewall is a fully equipped software version of the Astaro Security Gateway, available at no cost for home users – no strings attached. Astaro Security Gateway features full Network, Web, Mail and Web Application Security with VPN functionality and protects up to 50 IP addresses.
Seamless, Stressless, Wireless
It may be premature to see before December, but lately there have been some articles and forum posts across the Internet in which people debate how we haven’t really seen large advancements technology over the previous decade. The 60s had a cultural revolution and the Cold War, spawning the moon landings, ARPANET’s development and various leaps in technology. In the 70s the first general microprocessor was released and C was born.