Features

Update: Company news - Cryptocard/Interoute

Update: Company news - Cryptocard/Interoute

Managed services company Cryptocard is going into partnership with hosting firm Interoute. Cryptocard's Managed Authentication Service (Crypto-Mas) will enable Interoute's clients to secure their networks by providing authentication and identity management services. Crypto-Mas replaces static passwords with randomly generated, single-use passwords. The technology is currently used by Google and NASA.
Staff Writers Aug 14 2006 2:44PM Security
DataBank: Threat Report

DataBank: Threat Report

Hacker activity across the globe, plus a round-up of security-related news.
Staff Writers Aug 14 2006 2:44PM Security
DataBank: ThreatStats - Phishing attacks become more targeted as
the number of two-tiered viruses grows

DataBank: ThreatStats - Phishing attacks become more targeted as the number of two-tiered viruses grows

Staff Writers Aug 14 2006 2:44PM Security
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Staff Writers Aug 14 2006 2:44PM Security
Update: The Poll

Update: The Poll

37% of all spam originates from six European countries: France, Spain, Poland, Italy, Germany and the UK
Staff Writers Aug 14 2006 2:44PM Security
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Staff Writers Aug 14 2006 2:44PM Security
Update: Threat of the month - Drive-by malware

Update: Threat of the month - Drive-by malware

What is it?
Staff Writers Aug 14 2006 2:44PM Security
Update: Company news - Secure Computing/CipherTrust

Update: Company news - Secure Computing/CipherTrust

Secure Computing plans to buy messaging security firm CipherTrust for an estimated $273 million. The transaction will include $185 million in cash, 10 million shares of Secure Computing common stock and a $10 million promissory note, provided certain performance targets are met.
Staff Writers Aug 14 2006 2:44PM Security
Update: Company news - BlackSpider Technologies/SurfControl

Update: Company news - BlackSpider Technologies/SurfControl

Managed security service provider BlackSpider Technologies has been acquired by SurfControl for an estimated £20 million. SurfControl hopes the addition will let it provide multi-level products to address its clients' needs at the lowest possible cost.
Staff Writers Aug 14 2006 2:44PM Security
Update: Company news - CA/XOsoft

Update: Company news - CA/XOsoft

CA has added two more companies to its list of recent acquisitions. No details of its purchase of storage management company XOsoft were disclosed, but CA plans to integrate XOsoft's products with its own for a more rounded portfolio.
Staff Writers Aug 14 2006 2:44PM Security
Update: Company news - Chelsea and Westminster Health NHS
Trust/Crossbeam Systems

Update: Company news - Chelsea and Westminster Health NHS Trust/Crossbeam Systems

Chelsea and Westminster Healthcare NHS Trust has decided to use Crossbeam Systems' C-Series platforms for its firewall protection.
Staff Writers Aug 14 2006 2:44PM Security
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Staff Writers Aug 14 2006 2:44PM Security
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Staff Writers Aug 14 2006 2:44PM Security
Industry Views: Investment opportunities will remain in security even if glare of terror threat fades

Industry Views: Investment opportunities will remain in security even if glare of terror threat fades

While it may not always be politic to point out, the genius of markets lies in their ability to generate value in the aftermath of even the most horrific tragedies. In the wake of 9/11, for example, the security sector became - almost overnight - a productive and patriotic destination for venture and other forms of capital. Even while the sector's "15 minutes" appear to be ticking toward a close, relatively constant market dynamics within the security space ensure that opportunities will continue to abound for those who know where to look for them.
Andrea S. Aug 13 2006 10:50PM Security
Review: NetPilot

Review: NetPilot

The NetPilot appliance is simple to set up – you just plug it in and turn it on. It has clearly labelled ports for all network connections.
Peter Stephenson,CeRNS, Aug 10 2006 12:00AM Security
Review: Proventia Network MFS Appliance

Review: Proventia Network MFS Appliance

This product was amazingly easy to set up and use. Recommended for its power and simplicity, we had it up and running in no time at all.
Peter Stephenson,CeRNS, Aug 10 2006 12:00AM Security
Review: Sidewinder G2 1100C

Review: Sidewinder G2 1100C

The Sidewinder G2 is a powerful multi-function security tool, but requires some experience to get really comfortable with its management.
Peter Stephenson,CeRNS, Aug 10 2006 12:00AM Security
Review: VPN-1 UTM Edge Appliance

Review: VPN-1 UTM Edge Appliance

This is a user-friendly gateway-style appliance. Installation is made simple by an easy-to-follow setup wizard that sets up the initial port configuration for connecting to the internet and licensing the product. After setup, the intuitive web interface is used for all policy and device management.
Peter Stephenson,CeRNS, Aug 10 2006 12:00AM Security
Review: DFL-M510

Review: DFL-M510

The DFL-M510 is extremely easy to use. Take it out of the box, plug it in, log in to the Java-based web interface and follow the setup wizard for a quick, seamless installation into the network. Once the device is set up, the management interface becomes a one-stop shop for system and policy management, as well as for generating monitors, logs, and reports.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: Finjan Vital Security Web Appliance NG-5100

Review: Finjan Vital Security Web Appliance NG-5100

This appliance is in-depth and focused on malware, lacking VPN and IDS/IPS capabilities. The configurations are granular and take a lot of time to put in place. While the setup and installation of the NG-5100 are very simple, configuration is not an easy task. That said, documentation plays a large role in making the configuration process much less arduous.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security

Log In

  |  Forgot your password?