Technology

#BlackHat Video: How four million hotel locks failed

#BlackHat Video: How four million hotel locks failed

Cody Brocious talks about the widespread lock vulnerability.
Jul 27 2012 4:13AM Security
#BlackHat: FBI says learn network defence from SWAT

#BlackHat: FBI says learn network defence from SWAT

Use your home field advantage.
Dan Kaplan Jul 27 2012 3:30AM Security
Granular controls added to 4TRESS by ActivIdentity

Granular controls added to 4TRESS by ActivIdentity

ActivIdentity has added granular authentication controls to its 4TRESS product.
SC Staff Jul 27 2012 2:55AM Security
Symantec fires CEO

Symantec fires CEO

Follows Aussie MD exit.
SC Staff Jul 27 2012 2:55AM Security
#BlackHat: How exploit kits fuel online crime

#BlackHat: How exploit kits fuel online crime

Researcher examines how exploit kits function and who profits off them.
Dan Kaplan Jul 27 2012 2:46AM Security
SQLi increased by 69 per cent this year

SQLi increased by 69 per cent this year

Vendor detected half a million attacks.
Dan Raywood Jul 27 2012 2:29AM Security
Alcatel-Lucent lays off 5000 after loss

Alcatel-Lucent lays off 5000 after loss

Australian jobs safe?
Juha Saarinen Jul 26 2012 5:36PM Telco/ISP
Review: CloudPassage Halo

Review: CloudPassage Halo

Cloud systems usually are little more than virtual data centers on the internet.
Peter Stephenson Jul 26 2012 4:11PM Security
Review: MetaFlows Security System

Review: MetaFlows Security System

This is a killer app. The more we watched this one sort through the data that it was monitoring - over a million events and flows at a major university - and dig down and analyze it, the more we wanted one.
Peter Stephenson Jul 26 2012 4:06PM Security
Review: nCircle PureCloud

Review: nCircle PureCloud

We have looked at nCircle products before and we liked them a lot.
Peter Stephenson Jul 26 2012 3:58PM Security
Review: CipherCloud for Salesforce

Review: CipherCloud for Salesforce

Today, this product focuses on the Salesforce application, but it is well-positioned to apply to any cloud-based application.
Peter Stephenson Jul 26 2012 3:55PM Security
Review: Echoworx Security Cloud

Review: Echoworx Security Cloud

This is an interesting product. It is interesting both for what it does and what it doesn't do. What it does is manage credentialing throughout the enterprise, virtual or physical. It keeps credentials on the endpoints and encrypts there. It supports just about any platform one can think of.
Peter Stephenson Jul 26 2012 3:50PM Security
Review: KoolSpan TrustCall and TrustChip

Review: KoolSpan TrustCall and TrustChip

This one is a point solution to a point problem: voice call security from mobile phones. In addition, however, it has optional modules that secure text and email. We will focus on the voice capabilities for this review. The KoolSpan system includes the TrustCall software for the mobile phone, the TrustChip, also for the phone, and the TrustRelay Server (not covered in this review).
Peter Stephenson Jul 26 2012 3:43PM Security
Review: Sophos Mobile Control

Review: Sophos Mobile Control

Security solutions vendor Sophos is one of the newer players in the mobile device management market, yet has successfully created a full-featured offering that combines capabilities with ease of use. Sophos Mobile Control works with iPhone, iPad, Android, BlackBerry and Windows mobile devices.
Peter Stephenson Jul 26 2012 3:37PM Security
Review: AirWatch

Review: AirWatch

AirWatch tackles the mobile device management conundrum head on with an integrated approach that keeps devices secure, while protecting enterprise resources from compromise. The company's claim to fame comes in the form of its laser sharp focus on mobile device security, which takes a holistic approach to assigning, controlling and securing a variety of portable devices.
Peter Stephenson Jul 26 2012 3:33PM Security
Review: Good Technology Good for Enterprise

Review: Good Technology Good for Enterprise

Mobile device security vendor Good Technology, which Gartner Research placed in its Leaders Quadrant in its annual "MDM Magic Quadrant," enables consumers and enterprise users to say good riddance to the security problems surrounding today's multitude of mobile devices, a problem that only seems to be growing as more and more end-users bring iPhones, Andriod devices, iPads and countless other handhelds into the enterprise.
Peter Stephenson Jul 26 2012 2:49PM Security
Review: M.A.D. Mobile Enterprise Compliance and Security Server

Review: M.A.D. Mobile Enterprise Compliance and Security Server

The Mobile Enterprise Compliance and Security Server, or MECS Server, from Mobile Active Defense (M.A.D.) offers a full suite of tools for mobile device security.
Peter Stephenson Jul 26 2012 2:36PM Security
Confirmed: AAPT hacked

Confirmed: AAPT hacked

Anonymous' victim ISP revealed.
James Hutchinson , Juha Saarinen Jul 26 2012 2:32PM Security
Review: Fixmo SafeZone

Review: Fixmo SafeZone

SafeZone from Fixmo takes an interesting approach to mobile device security and management.
Peter Stephenson Jul 26 2012 2:32PM Security
Review: AlgoSec Security Management Suite

Review: AlgoSec Security Management Suite

The Security Management Suite from AlgoSec provides many features for both firewall policy and risk management.
Peter Stephenson Jul 26 2012 2:26PM Security

Log In

  |  Forgot your password?