The industrys gossip grapevine lately has entwined Symantec in its grasp. Seems the company is considering going private.
Here is an update from the IT security industrys boardrooms.
Harry hack A hacker named Gabriel claimed to have breached the networks of the UKs Bloomsbury Publishing, uncovering the ending of Harry Potter and the ...
Is signature-based anti-virus dead?
American companies, while often technology leaders (both as developers and users), havent kept up with their Asian counterparts in how they approach security. They take ...
Marty Hodgett, CIO, Orchard Supply Hardware, answers SC Magazine's questions about his job.
There is a general belief by end-users and executives that most information security incidents contain a level of extraordinary activity and usually do not occur ...
It appears that today, business contingency, disaster recovery, and compliance are the hot phrases in information technology circles. Risk analysis in particular, is grossly misunderstood ...
One of the most common concerns I find when asking security managers about their legacy physical security systems is that, generally, they are not very ...
This month we saw the effects of the market in both of our product test groups. In one case, IDS/IPS, we saw for the first ...
Banks and financial institutions are targets not only because, in the words of bank-robber Willy Sutton, thats where the money is, but because they are ...
Recent headlines illustrate that data breaches continue to occur across all industries. The Privacy Rights Clearinghouse reports that more than 155 million records including sensitive ...
What began as a frantic effort to meet federally mandated personal authentication guidelines for online banking has morphed into a drive to boost the bottom ...
In this special section, we look at how the IT security industry works to protect banks and financial institutions and keeps up with the rise ...
When notice of a widespread phishing attack against MySpace members was posted in a June Google security blog, Colin Whittaker, a Google anti-phishing team member ...
When the Steak n Shake Company began accepting credit cards a few years ago as a way to increase revenue and appease its plastic-friendly clientele, ...
Recent high profile data breaches have underscored the need for robust information security within organizations. But with names like Pfizer, TJX and the Department of ...
AppDetectivePro primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of ...
This software-only product can be deployed as an inline IDS, inline IPS, or deployed off of a tap. Additionally, it can provide detailed threat and ...
The RadWare DefensePro is an appliance-based product that requires the RadWare InSite appliance for configuration and management. Together these two products are feature-rich and offer ...
This device is like a slightly stripped down version of a unified threat manager (UTM). The SecurityMetrics IDS/IPS not only includes IDS/IPS functionality, but it ...
The Reflex Interceptor 1000 is an IPS with a twist. This appliance not only has a highly capable IPS with protection for such vectors as ...
The Top Layer IPS offers good protection features. This product includes what Top Layer calls Three Dimensional Protection. This device uses the IPS for protection ...
The NitroGuard IPS is part of the NitroView suite of products available from NitroSecurity. It is one of a handful of IPS products that allows ...
The Proventia IPS GX6116 could be considered the high-end sports car of IPS appliances. Not only does this device include several protection and analysis features ...
Watchfire AppScan is a software-based offering, which runs from the Windows platform. You may remember earlier versions of AppScan that required a Linux-based server and ...
The SPI Dynamics Assessment Management Platform (AMP) is an appliance-based offering. The core component of the AMP offering is the WebInspect application, which is well ...
The Cenzic Hailstorm offering is a software-based solution which truly performs application vulnerability assessment. Once the product is up and running, the wizard allows you ...
The Ounce Labs offering is a software-based solution, which is actually a CASE (computer aided software engineering) utility. Ounce 4 works by reviewing code for ...
The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility. Any source code can be reviewed with the ...
NGS Software Typhon is more of a traditional network vulnerability assessment tool with some application intelligence built in. The utility was able to locate FTP-based ...
There's vulnerability assessment and penetration testing, but what about vulnerability analysis? Before you tell me that I'm just playing with words, stop for a sec ...