Vendors/Products

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

T/bone SecureMail Gateway Version 1.0.3 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rafael Peregrino da Silva writes, "T/bone SecureMail Gateway allows digital signature and encryption for the entire email traffic of a company with a single organizational certificate. This server based solution works transparently for end users. T/bone automatically finds certificates . . .

Security is poor because vendors are not held responsible

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network security is not a technological problem; it's a business problem. The only way to address it is to focus on business motivations. To improve the security of their products, companies - both vendors and users - must care; for companies to care, the problem must affect stock price. The way to make this happen is to start enforcing liabilities.. . .

Microsoft Security Tool Leaves Holes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Problems with Microsoft Corp.'s Windows Update are causing the automated scanning service to mismanage patches, leaving IT managers to wonder whether the systems they thought were safely patched are actually vulnerable. WU, which was originally meant for consumers but is used . . .

Ernst & Young Launches Updated Extreme Hacking Courses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ernst & Young LLP, one of the world's largest professional services firms, today announced the schedule for the seventh year of its acclaimed eXtreme Hacking courses, which allows information technology professionals to gain hands-on experience with techniques that a "hacker" might use to attack and penetrate a corporate network.. . .

Users slam Microsoft Security Analyser

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft released the Baseline Security Analyser (MBSA), a free tool which analyses Windows systems for common security misconfigurations, earlier this week. But users have already slammed it as just a GUI version of the software giant's HfNetChk.. . .

MS vs. open source: Security's the same

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The fact is, both sides have their share of problems--but neither side has the edge when it comes to fixing security holes. You're just as likely to encounter a security problem with open source code as you are with Microsoft Windows, and the fix is just as likely to appear quickly and be done properly.. . .

Web Hosting Firms Key To Success For SSL Providers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

... despite the paramount importance of SSL certificates, hosting companies have had few options when it comes to purchasing them. Until late 2001, Web hosts typically had two main choices: VeriSign or Thawte. With the entrance of 2002, however, the battle to secure the Web servers of hosting companies, their clients and other large-scale enterprises finally seems to be heating up.. . .

Linux zlib security flaw could affect numerous programs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A warning about the security flaw identified Monday in the zlib compression/decompression library affecting Linux systems (see story) has been broadened to include Windows and any other other operating systems that use the zlib code. In an update about the flaw on their Web site, the authors of the zlib library said they have learned that the code is used in far more programs than they originally believed.. . .

Open-source flaw threatens MS code

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security flaw in open-source software used by Linux and Unix systems for compression may affect some Microsoft products that also use the code. As reported earlier this week by CNET News.com, a flaw in the zlib software-compression library could . . .

PGP Encryption Will Survive, Inventor Says

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Pretty Good Privacy will go on, despite a move by Network Associates to shelve the encryption product after it couldn't find a buyer, PGP inventor Phil Zimmermann says. Although Zimmermann sold PGP to Santa Clara, California-based NAI in 1997, the protocols for the encryption code are open to all on the Internet.. . .