Features

News briefs

News briefs

Breach in Texas The University of Texas suffered its second major data breach in three years when more than 197,000 personal records were exposed at the McCombs School of Business. The breach compromised the Social Security numbers and other biographical information of alumni, faculty, staff and students of the business school. Not much is known about the source of the breach, though UT officials said they are working on an investigation. In the meantime, the university set up a website and toll-free numbers to direct those potentially affected to protect their identities.
Staff Writers Jun 5 2006 10:41PM Security
Debate

Debate

This month's topic: Companies should use unofficial patches to fix vulnerabilities
Chris Andrews Jun 5 2006 10:34PM Security
Company news

Company news

Lumeta, a provider of network intelligence solutions, has promoted David Arbeitel to CTO and senior vice president of product strategy. He previously served as senior vice president of strategic development. Arbeitel’s new role comes as Lumeta is expanding its overall technology focus to help businesses with compliance, IT optimization and security risk management.
Staff Writers Jun 5 2006 10:04PM Security
Firefox: a safer option?

Firefox: a safer option?

A number of recent critical flaws discovered in Mozilla Firefox has raised doubt on whether the open-source web browser still can be considered a much safer alternative to Internet Explorer.
Dan Kaplan Jun 5 2006 9:59PM Security
Me and my job

Me and my job

How did you get into security? I was the sole IT person for a small community bank, and as security became more prevalent in the industry and regulators began focusing on it, I had to become much more knowledgeable in that area.
Jason James Jun 5 2006 9:48PM Security
IM-based malware threat grows

IM-based malware threat grows

Just as the number of end-users enlisting instant messaging (IM) programs to communicate has risen, so too has the number of distinct families of IM-based malware. More attackers are utilizing this propagation method and infections are increasingly sophisticated.
Jose Nazario Jun 5 2006 9:39PM Security
Structure found in process

Structure found in process

As technically oriented security professionals we often don’t pursue structure in our testing. We simply use the same vulnerability scans and penetration tests we’ve been using for years — updated, of course, for the latest network nasties. Today, that simply is not enough.
Peter Stephenson,CeRNS, Jun 5 2006 9:35PM Security
Advance commerce through innovation

Advance commerce through innovation

Smart cards make perpetrating fraud considerably more difficult than "traditional" magstripe cards. In regions where offline processing is the dominant method for processing transactions this especially is true. As a result — and even though we have driven payment card fraud to an all-time low — our industry is now seriously exploring how smart card technology can become the primary driver in the evolution of payment card security.
Staff Writers Jun 5 2006 9:03PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Jun 5 2006 9:00PM Security
Meet your attackers on their own own turf

Meet your attackers on their own own turf

There’s plenty of talk today about perimeter security strategies. Protecting the perimeter with multilayered security. Identifying the perimeter. The latest buzz on firewalls. Zero-day attacks. Worm storms. Security toolkits with the latest intrusion detection tools. Secure software applications.
Todd Bransford Jun 5 2006 8:28PM Security
Review: AppSense Application Manager and Environment Manager

Review: AppSense Application Manager and Environment Manager

The AppSense Application Manager (AM) can be set up as a standalone product in a test environment before actual deployment. The standalone preconfiguration enables an administrator to get to know and tweak the program for the best configuration for each particular environment.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: LANDesk Security Suite

Review: LANDesk Security Suite

This product incorporates all the features of a great endpoint security product in one program. LANDesk must be installed on a central server, which must pass certain security and version tests before install will begin. After installation, policies can be set for access, applications, software versions, service packs, anti-virus, and so on. Agents planted across the network also allow the console administrator to take remote control of machines in violation of policies. Security Suite is part of a larger set of integrated products.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: Safe Access

Review: Safe Access

This appliance comes loaded with features. Three default security policies monitor for up-to-date service packs, critical updates, anti-virus programs and updates, and the presence of worms, viruses or Trojans.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: Spectator Professional

Review: Spectator Professional

Promisec’s Spectator Professional software combines the functionality of an appliance with the simplicity of standalone software.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: UTM Plus

Review: UTM Plus

Network Box offers hosted security services based on its own custom appliances installed locally on end users’ networks. The company has a range of services designed to meet the requirements of firms of all sizes – from small home office users to large corporate enterprises.
Jon Tullett Jun 1 2006 12:00AM Security
Review: RFprotect Endpoint

Review: RFprotect Endpoint

Despite the name, this is not similar to the endpoint products in this month’s endpoint security group test, hence its inclusion here on its own.
Jon Tullett Jun 1 2006 12:00AM Security
Dial M for Mobile Authentication

Dial M for Mobile Authentication

Recent efforts by the financial services industry to reduce the extent of credit card fraud are starting to pay off.
Paul Meadowcroft May 24 2006 11:35AM Security
Review: Skybox View 2.5

Review: Skybox View 2.5

This suite of security risk management applications contains components that analyze networks for vulnerabilities, identify risks, spot anomalous activity and report on it, raise alerts and track mitigation, then map the whole lot back to a set of business processes and risk models.
Jon Tullett May 12 2006 12:00AM Security
Review: Configuresoft ECM and SUM

Review: Configuresoft ECM and SUM

Configuresoft’s Enterprise Configuration Manager (ECM) is a management application for configuration, patching, security, audit and compliance – and all from a single, very scalable console view.
Jon Tullett May 12 2006 12:00AM Security
Cashing in on misconfigured systems

Cashing in on misconfigured systems

It’s not news anymore that cyberattackers penetrating corporate networks are after money, not infamy, these days. The bread they can make from these and other online activities, such as spam, is staggering. One only has to look at the recent case of Christopher William Smith, who allegedly made over $20 million illegally selling prescription drugs through spam emails.
Illena Armstrong May 10 2006 8:10PM Security

Log In

  |  Forgot your password?