web

Web Services: Convenience at a Price

Web Services: Convenience at a Price

We have all heard about web services.
Dick Mackey Jan 15 2004 12:20PM Security
Not Everything You Always Wanted to Know About Web Services Security

Not Everything You Always Wanted to Know About Web Services Security

Woody Allen, that famous web services guru and comedian on the side, once described James Joyce as “the most incomprehensible and hence the finest poet of his time.”
Throop Wilder Jan 15 2004 10:13AM Security
Security and Web Services

Security and Web Services

What is in essence a framework for designing, developing and building a new generation of applications around web standards and protocols, web services promises to make it far easier to integrate applications across disparate hardware and software platforms - a constant gripe with existing technology. Backed by all of the major IT vendors (Microsoft, IBM, Sun, Oracle, etc.), web services certainly will not suffer from a lack of effort or exposure, but will it take off and what are the issues?
Peter Doyle Jan 14 2004 5:02PM Security
What to Look for in a Web Application Protection System

What to Look for in a Web Application Protection System

The number of technology pundits decrying the state of Internet security has reached an unbearable level.
Abishek Chauhan Jan 14 2004 3:44PM Security
Web Site Availability

Web Site Availability

Best practice (ISO 17799) advocates the development of information security policies to ensure the confidentiality, integrity and availability of information.
Staff Writers Jan 14 2004 3:07PM Security
Timing security practices for web application success

Timing security practices for web application success

Last year, says Caleb Sima, many organizations began using web application security assessment tools and discovered that many vulnerabilities could not be corrected because they resulted from insecure application development practices.
Caleb Sima Jan 13 2004 2:28PM Security
Web services: Useful but dangerous?

Web services: Useful but dangerous?

Web services promise to change the way we build applications but, as Daniel Murton argues, security poses a huge challenge.
Daniel Murton Jan 13 2004 1:27PM Security
Are You Safe On the Web?

Are You Safe On the Web?

Proper use of the internet is becoming vital for corporations and public organizations.
Kevin Thiele Jan 12 2004 12:26PM Security
How to Ensure Complete Web Transaction Privacy - Even After Your Data is Stored

How to Ensure Complete Web Transaction Privacy - Even After Your Data is Stored

Most forward-looking companies today leverage the internet as their primary business communications tool linking employees, customers, partners, and suppliers.
Franklyn Jones Jan 12 2004 11:18AM Security
Privacy Falls Through the Web

Privacy Falls Through the Web

You wouldn’t walk around the King of Prussia Mall with your social security number tattooed on your forehead.
Lou D’Ambrosio Jan 9 2004 4:42PM Security
Are your Web servers haemorrhaging cash?

Are your Web servers haemorrhaging cash?

Hackers manage to successfully break into systems much more often than you might realise.
Yuval Ben-Itzhak Jan 9 2004 3:19PM Security
Govt advises on safe web surfing

Govt advises on safe web surfing

Vivienne Fisher Nov 26 2003 12:00AM Telco/ISP
Review: GFI LANguard System Integrity Monitor

Review: GFI LANguard System Integrity Monitor

GFI LANguard System Integrity Monitor (SIM) detects whether files have been changed on a Windows 2000/XP system. It identifies exactly which files have been changed, making it easy to restore the system to its original state, although it does not provide any utility for automatic recovery - you have to have secured original copies of these files elsewhere.

Geoff Marshall Aug 1 2003 12:00AM Security
Review: G-Server

Review: G-Server

The G-Server is the only hardware in this Group Test - all the other products consist of software. It is designed to be installed inline between the DMZ port on your firewall and a public web server. It is completely transparent and requires no changes to any network settings on other network equipment. It has no IP address visible to the outside world, so is undetectable by hackers. Even the MAC addresses of its NICs reflect those of the real web server to make the G-Server even more transparent. Two G-Servers may be configured for high availability.

Geoff Marshall Aug 1 2003 12:00AM Security
Review: McAfee Entercept

Review: McAfee Entercept

Entercept is an intrusion prevention system (IPS). In common with traditional host-based intrusion detection systems (HIDS), Entercept resides on the host itself, but it works at a much lower level than a normal HIDS system.

Geoff Marshall Aug 1 2003 12:00AM Security
Review: Secuve TOS

Review: Secuve TOS

TOS stands for 'trusted operating system.' It can also be used to protect servers that are providing DNS, as well as file servers, database servers, proxy servers and mail servers. TOS can protect any static files, including whole directories, drives, Windows registries and, of course, web pages.

Geoff Marshall Aug 1 2003 12:00AM Security
Review: Centennial Discovery Web Edition

Review: Centennial Discovery Web Edition

This inventory application uses a technology called Lanprobe to meter software usage and discover devices on a network.

René Millman Aug 1 2003 12:00AM Security
Review: Tripwire

Review: Tripwire

A complete Tripwire system consists of two components: Tripwire for Servers, which is an agent that must be installed on all servers that are to be protected; and Tripwire Manager, which provides central management for any number of Tripwire for Servers agents. Communications between server agents and management workstation are secured using the secure sockets layer (SSL) protocol.

Geoff Marshall Aug 1 2003 12:00AM Security
Review: WatchGuard Applock/Web

Review: WatchGuard Applock/Web

Applock/Web works for web servers based on Microsoft IIS running on Windows NT/2000. It locks down both operating system and web server application. It auto-discovers which files are associated with web server functions (this may include web content and web scripts) and locks them down. It works within the operating system at the kernel level.

Geoff Marshall Aug 1 2003 12:00AM Security
Review: Web Inspector

Review: Web Inspector

Unlike the other products in this Group Test Web Inspector is neither system policy management or email policy management, but in fact an internet compliance tool that uses policy to set its users' boundaries. Suitable as a single installation for the smaller enterprise, this solution easily scales up to a distributed deployment over a large network.

Policy starts with access control, ensuring that users only have the rights assigned by the administrator in line with your corporate policy. Whether you choose to assign the same rights across the network or drill down your policy into user groups, sites, or individual users or workstations, is your choice. Policies can be created to suit your needs and ensure that only the web pages that your company deems necessary are viewed within work hours, allowing for the organization to permit safe surfing on non-business sites at stipulated times.

Jayne Parkhouse Mar 1 2003 12:00AM Security

Log In

  |  Forgot your password?