Vendors/Products - Page 67.5

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Guardian Digital offers new Secure Linux server OS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Setting up a secure server isn't necessarily for the faint of heart. To make it easier for IT administrators, Guardian Digital Inc. has released EnGarde Secure Linux Version 1.2, offering a secure server operating system for mail, Web and other servers without the hassle of an intricate customization.. . .

IBM tackles drive-by hacking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IBM has developed software which it claims can effectively prevent drive-by hacking. Software developed by IBM Research in the US apparently turns servers into wireless auditing sniffers that alert administrators if a network has misconfigured wireless access points. The . . .

Bending Your Ear on Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Feeling a bit insecure these days? Boy, do we have a cure for you! Just read this issue cover to cover, and I guarantee a secure feeling will wash over you. Of course, it'll then be your responsibility to use this newfound knowledge to apply security in just the right amounts for your IT infrastructure. If you use wireless technology, run Linux or are considering an MPLS-based VPN service, read on. . . .

IBM Strengthens Linux Security with Tivoli Software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IBM is delivering new capabilities across its Tivoli security management software portfolio, including IBM Tivoli Access Manager, IBM Tivoli Risk Manager and IBM Tivoli Identity Manager, that enable organizations to make secure access, threat and identity management more effective in heterogeneous environments.. . .

EnGarde Secure Linux walks away with Editor's Choice, Beats HP, Immunix

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

EnGarde walked away with our Editor's Choice award thanks to the depth of its security strategy, which covers nearly all the bases. Everything from the low-level mechanisms (binary integrity checking and stack protection) to high-level usability issues (including an excellent patching interface) demonstrate the serious effort the Guardian Digital crew has invested in EnGarde. . . .

Ultimate Computer Security Devices

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Yankee Group senior analyst Anil Phull told NewsFactor that the best practice for companies using biometric devices is to deploy them with other identification tools. Biometrics have long been the basis of the ultimate security technologies in science fiction -- but can these safeguards, which rely on fingerprints, eyeballs and other personal traits to authenticate users, really secure the enterprise?. . .

US TurboLinux Security Severely Out of Date

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is the second time TurboLinux has let security support for its US products lapse for an extended period, the first being about two years ago, when budget cutbacks resulted in the Linux distribution security staff at TurboLinux being let go. It was not until several months later that new security staff was hired (at the time only a single person) and security updates for the products were made available once again.. . .

T/bone SecureMail Gateway Version 1.0.3 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rafael Peregrino da Silva writes, "T/bone SecureMail Gateway allows digital signature and encryption for the entire email traffic of a company with a single organizational certificate. This server based solution works transparently for end users. T/bone automatically finds certificates . . .

Security is poor because vendors are not held responsible

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network security is not a technological problem; it's a business problem. The only way to address it is to focus on business motivations. To improve the security of their products, companies - both vendors and users - must care; for companies to care, the problem must affect stock price. The way to make this happen is to start enforcing liabilities.. . .

Microsoft Security Tool Leaves Holes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Problems with Microsoft Corp.'s Windows Update are causing the automated scanning service to mismanage patches, leaving IT managers to wonder whether the systems they thought were safely patched are actually vulnerable. WU, which was originally meant for consumers but is used . . .

Ernst & Young Launches Updated Extreme Hacking Courses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ernst & Young LLP, one of the world's largest professional services firms, today announced the schedule for the seventh year of its acclaimed eXtreme Hacking courses, which allows information technology professionals to gain hands-on experience with techniques that a "hacker" might use to attack and penetrate a corporate network.. . .