Features

When ghosts spam

When ghosts spam

Most spam is sent to non-existent addresses, but that can still generate annoying messages for genuine users.
Ian Castle May 6 2008 2:23PM Security
Review: Cymphonix Network Composer

Review: Cymphonix Network Composer

Network Composer from Cymphonix brings together critical web protection aspects into one product. It not only features URL and web filtering, but also many traffic-shaping and application controls.
Peter Stephenson, May 6 2008 2:13PM Security
Review: IBM Proventia Web Filter

Review: IBM Proventia Web Filter

The Proventia Web Filter is a piece of the much larger Proventia multi-function appliance. It is available either as part of the appliance or as a standalone product.
Peter Stephenson, May 6 2008 2:12PM Security
The importance of recursive DNS

The importance of recursive DNS

To provide a safer internet browsing experience, recursive services are being provided free of charge.
Rodney Joffe, senior vice president and senior technologi May 5 2008 3:50PM Security
Review: Application Security, Inc.'s DbProtect 2007

Review: Application Security, Inc.'s DbProtect 2007

Application Security's DbProtect 2007 is a suite of enterprise database security products that helps organisations discover and manage database vulnerabilities.
Nathan Ouellette May 5 2008 3:48PM Security
Winning against the phishing assault

Winning against the phishing assault

A look at two of the signing technologies PayPal plans to use to improve sent email authentication, which would allow ISPs to drop each email that isn't properly verified.
Amol Sarwate, May 2 2008 1:53PM Security
Review: IBM's Rational AppScan 7.7

Review: IBM's Rational AppScan 7.7

IBM's Rational AppScan 7.7 (Watchfire is now an IBM company) is a stand-alone web application assessment product that is part of IBM's Rational software group.
Nathan Ouellette May 2 2008 1:44PM Security
Facing the reality of internal risk: Thwarting insider threats

Facing the reality of internal risk: Thwarting insider threats

When we think about IT saboteurs, most of us picture a professional cyber-criminal or hacker bent on stealing confidential information or wreaking havoc. In both cases, the perpetrator is an outside party who breaches the data network of a company, institution, or government entity with malicious intent.
David Ting, CTO, Imprivata May 1 2008 7:30AM Security
Review: iSEC Partners Security QA Toolbar

Review: iSEC Partners Security QA Toolbar

The SecurityQA Toolbar from iSEC Partners is a browser-based add-in for Internet Explorer that is used to perform web-application vulnerability testing directly within the browser environment.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 1 2008 1:00AM Security
The legal implications of the PCI data security standard

The legal implications of the PCI data security standard

The Payment Card Industry Data Security Standard presents serious legal challenges and risk for retailers.
David Navetta, InfoSecCompliance, LLC Apr 30 2008 3:23PM Security
Review: Fortify Source Code Analysis Suite 4.5

Review: Fortify Source Code Analysis Suite 4.5

Fortify Source Code Analysis Suite 4.5 performs static source code analysis. Various languages and architectures including ASP.NET, C/C++, C#, Java, JSP, PL/SQL, T-SQL, XML, VB.NET and other.NET languages are supported.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 30 2008 3:13PM Security
Opinion: CDMA closure causes chaos

Opinion: CDMA closure causes chaos

Just one day after the closure of Telstra’s CDMA mobile phone network, complaints are flooding into hotlines across the country with rural and regional callers blaming the shutdown of the service for everything from cot deaths to crop failures.
Ian Yates Apr 29 2008 2:44PM Telco/ISP
Review: Cenzic Hailstorm Enterprise ARC 5.5

Review: Cenzic Hailstorm Enterprise ARC 5.5

Cenzic Hailstorm Enterprise ARC (Application Risk Controller) 5.5 is a centrally managed web-application assessment product. It consists of a web-based dashboard and a separate, stand-alone desktop application component for customising projects, scan settings and policies.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 29 2008 9:55AM Security
Protecting the IPTV/VoD infrastructure

Protecting the IPTV/VoD infrastructure

To ensure the success of their new IPTV/VoD services, providers must build into their networks a comprehensive, network-centric security strategy right from the start.
Scott Heinlein, Juniper Networks, Inc. Apr 28 2008 12:17PM Security
Review: Ounce Labs 5.0

Review: Ounce Labs 5.0

Ounce Labs 5.0 is a static source code analysis solution based primarily on two separate components. The application approaches application vulnerability assessment by statically analysing source code and supports many different languages, including C/C++, Java/JSP,.NET (C#, VB.NET, ASP.NET) Classic ASP (VB and Javascript) and Visual Basic.
Nathan Ouellette Apr 28 2008 12:16PM Security
Protecting human values from Human-Computer Interaction

Protecting human values from Human-Computer Interaction

These days, it is nigh on impossible to stop the infiltration of technology into our lives. Business communications are conducted via phone or e-mail. Information is searched for and obtained online. Even our kitchens are getting smarter, with Internet-enabled fridges opening doors to food for both the body and mind.
Liz Tay Apr 24 2008 4:25PM Software
Rethinking virus protection

Rethinking virus protection

With the growth of malicious programs currently outpacing that of legitimate applications, and traditional countermeasures proving inadequate, consumers and security vendors may need to join forces to ward off threats.
Mark Bregman, CTO, Symantec Corp Apr 24 2008 2:50PM Security
Online identity theft: Who's after my Facebook password?

Online identity theft: Who's after my Facebook password?

The questions of "who" and "why" in identity theft remain largely ignored. That is, "Who is after online identities? And what for?"
Guillaume Lovet, Manager, Threat Response Team, Fortinet Apr 24 2008 2:46PM Security
Review: HP WebInspect 7.7

Review: HP WebInspect 7.7

Developed by SPI Dynamics, which is now part of HP Software, WebInspect 7.7 is a stand-alone web-application testing product. Although it is not an enterprise solution in itself, it can easily be integrated into HP's AMP architecture for centralised administration and reporting capabilities.
Nathan Ouellette Apr 24 2008 2:45PM Security
Review: 8e6 Technologies Professional Edition

Review: 8e6 Technologies Professional Edition

This package from 8e6 Technologies offers high flexibility for the large enterprise. The bundle consists of the R3000, the Enterprise Reporter and the Threat Analysis Reporter.
Peter Stephenson, Apr 24 2008 1:00PM Security

Log In

  |  Forgot your password?