Vendors/Products - Page 67.5
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The recent situation regarding the Apache chunk encoding vulnerability has caused plenty of controversy in the security industry. It initially began with the community dislike of the release of information. Then it was debated as to weather or not this was really an exploitable. . .
When designing Web sites, developers usually focus on the appearance and the back end. And they generally rush to get their e-commerce sites to production, often at the expense of adequate security and testing. In fact, Web applications are the weak . . .
Setting up a secure server isn't necessarily for the faint of heart. To make it easier for IT administrators, Guardian Digital Inc. has released EnGarde Secure Linux Version 1.2, offering a secure server operating system for mail, Web and other servers without the hassle of an intricate customization.. . .
IBM has developed software which it claims can effectively prevent drive-by hacking. Software developed by IBM Research in the US apparently turns servers into wireless auditing sniffers that alert administrators if a network has misconfigured wireless access points. The . . .
Feeling a bit insecure these days? Boy, do we have a cure for you! Just read this issue cover to cover, and I guarantee a secure feeling will wash over you. Of course, it'll then be your responsibility to use this newfound knowledge to apply security in just the right amounts for your IT infrastructure. If you use wireless technology, run Linux or are considering an MPLS-based VPN service, read on. . . .
IBM is delivering new capabilities across its Tivoli security management software portfolio, including IBM Tivoli Access Manager, IBM Tivoli Risk Manager and IBM Tivoli Identity Manager, that enable organizations to make secure access, threat and identity management more effective in heterogeneous environments.. . .
EnGarde walked away with our Editor's Choice award thanks to the depth of its security strategy, which covers nearly all the bases. Everything from the low-level mechanisms (binary integrity checking and stack protection) to high-level usability issues (including an excellent patching interface) demonstrate the serious effort the Guardian Digital crew has invested in EnGarde. . . .
Yankee Group senior analyst Anil Phull told NewsFactor that the best practice for companies using biometric devices is to deploy them with other identification tools. Biometrics have long been the basis of the ultimate security technologies in science fiction -- but can these safeguards, which rely on fingerprints, eyeballs and other personal traits to authenticate users, really secure the enterprise?. . .
This is the second time TurboLinux has let security support for its US products lapse for an extended period, the first being about two years ago, when budget cutbacks resulted in the Linux distribution security staff at TurboLinux being let go. It was not until several months later that new security staff was hired (at the time only a single person) and security updates for the products were made available once again.. . .
Jim Azevedo writes, "NeoScale Systems, Inc., a provider of enterprise storage security solutions for the burgeoning network storage market, today announced the formation of its technical advisory board - comprised of accomplished and recognized contributors to the storage and security industries.. . .
Growing security concerns within the enterprise communication market are challenging chipmakers to develop advanced, silicon-based encryption techniques that will not erode processor performance.. . .
A slew of vendors this week will take the stage at NetWorld+Interop 2002 Las Vegas to highlight new products and services aimed at making networks safer. Vendors are looking to simplify this important task by processing multiple security applications on a . . .
Rafael Peregrino da Silva writes, "T/bone SecureMail Gateway allows digital signature and encryption for the entire email traffic of a company with a single organizational certificate. This server based solution works transparently for end users. T/bone automatically finds certificates . . .
Biometrics vendors are doing their best to supplant passwords as the chief form of computer security, but Government Computer News Lab tests indicate that many of their products are not quite ready. Some developers have continued to improve already good devices, . . .
Angela Schwartz writes, "Netlock Technologies develops Contivity VPN Clients for Macintosh, Linux, Solaris, HP-UX, and IBM-AIX. No other company offers the breadth of VPN client operating system support that is available with the Nortel VPN Switch. . . .
Executives at Linux security company Cylant say the computer security industry is engaged in a "conspiracy of sorts," or at least a conspiracy of ignorance, in taking a reactive approach to fighting vulnerabilities. Cylant is pitching its CylantSecure server monitoring . . .
Network security is not a technological problem; it's a business problem. The only way to address it is to focus on business motivations. To improve the security of their products, companies - both vendors and users - must care; for companies to care, the problem must affect stock price. The way to make this happen is to start enforcing liabilities.. . .
Problems with Microsoft Corp.'s Windows Update are causing the automated scanning service to mismanage patches, leaving IT managers to wonder whether the systems they thought were safely patched are actually vulnerable. WU, which was originally meant for consumers but is used . . .
Ernst & Young LLP, one of the world's largest professional services firms, today announced the schedule for the seventh year of its acclaimed eXtreme Hacking courses, which allows information technology professionals to gain hands-on experience with techniques that a "hacker" might use to attack and penetrate a corporate network.. . .
Crossbeam Systems, Inc., announced general availability of version 2.0 of the Crossbeam X40S, the first "open appliance" for providing a complete, high-performance security solution composed of multiple "best of breed" applications from leading independent software vendors (ISVs). Initial enterprise and service . . .