vulnerability

Digital Stakeout acquires vulnerability scanning firm

Digital Stakeout acquires vulnerability scanning firm

Digital Stakeout, an Atlanta-based managed security services company, has acquired ScannerX, a provider of vulnerability scanning and assessment services.
Marcia Savage Apr 1 2005 10:32PM Security
Fresh MS vulnerability is revealed in Denmark

Fresh MS vulnerability is revealed in Denmark

Staff Writers Jan 14 2005 5:07PM Security
Review: Core Impact

Review: Core Impact

Core Impact enables an organization to conduct penetration testing as a specialist would.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Lockdown Auditor

Review: Lockdown Auditor

Lockdown Auditor is a 1U rack-mountable device that connects into a network and scans IP addresses for vulnerabilities.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: nCircle IP360

Review: nCircle IP360

If you are looking for flexibility, scalability and ease of use for vulnerability scanning and assessments, the IP360 offered by nCircle may be what you want.<
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Sniffer Portable 4.7.5

Review: Sniffer Portable 4.7.5

Sniffer Portable is more than a product.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Sunbelt Network Security Inspector

Review: Sunbelt Network Security Inspector

This is a vulnerability scanner for Microsoft operating systems and applications.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Typhon 3

Review: Typhon 3

Many consultancies offer services to conduct vulnerability tests against networks, but NGS is renowned for doing so.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: WebInspect

Review: WebInspect

T he depth in which websites and web services are assessed by WebInspect and its clarity of vulnerability descriptions and suggested fixes is impressive.
Julian Ashbourn Jun 1 2004 12:00AM Security
Microsoft reveals XP and 2003 vulnerability

Microsoft reveals XP and 2003 vulnerability

Microsoft has admitted that a vulnerability in Windows Server 2003 and XP could allow hackers to take control of PCs by luring users to a dangerous website that contains remote execution link.
Dan Ilett May 14 2004 1:13PM Security
Volunteers launch vulnerability website

Volunteers launch vulnerability website

Volunteers have launched a free internet website that logs IT security vulnerabilities.
Dan Ilett Apr 16 2004 3:33PM Security
eEye Digital updates vulnerability management console

eEye Digital updates vulnerability management console

eEye Digital Security on Monday rolled out a new version of its REM Management Console, featuring increased scalability, a new interface, and the ability to be integrated with third-party products.
Marcia Savage Mar 23 2004 4:49PM Security
Readability is vulnerability

Readability is vulnerability

Watermarking is playing a more significant role, but is a far cry from the protection most critical data requires, says Barbara Gengler
Barbara Gengler Jan 13 2004 5:03PM Security
Vulnerability Testing: Keeping a tight ship

Vulnerability Testing: Keeping a tight ship

Knowing where your network is vulnerable is half the battle. Illena Armstrong looks at the need for penetration test assessments
Illena Armstrong Jan 13 2004 12:28PM Security
Automated Vulnerability Assessment: How to Underpin Your Security Investment

Automated Vulnerability Assessment: How to Underpin Your Security Investment

Many organizations are now relying upon the vital support that vulnerability assessment can offer as the fourth pillar of security.
Amer Deeba Jan 12 2004 2:10PM Security
Has There Ever Been a Better Time to Talk Up Vulnerability Assessment?

Has There Ever Been a Better Time to Talk Up Vulnerability Assessment?

We often hear of prevention being better than cure.
Richard Walters Jan 12 2004 12:45PM Security
Combating Enterprise Vulnerability

Combating Enterprise Vulnerability

The technological revolution has occurred gradually and relatively quietly, meaning many top managers don’t realize how dependent their organizations have become on electronic information.
Jim Simmons Jan 12 2004 11:19AM Security

Log In

  |  Forgot your password?