Vendors/Products - Page 60
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Network-security company CyberGuard Corp. on Thursday said it has agreed to acquire privately held SnapGear for $16 million in stock and cash.. . .
Lokitech Inc., a small software security firm in suburban Washington, D.C., has crafted an Open Source-based security solution for credit card processing that will run with .NET and Java enterprise systems. . .
The market is heating up for products that allow secure access to corporate networks based on a widely used browser security technology known as secure sockets layer encryption. Cisco Systems became the latest company to introduce a virtual private network (VPN) . . .
In this short paper I want to explore the rather interesting row level security feature added to Oracle 8i and above, starting with version 8.1.5. This functionality has been described as fine grained access control or row level security or virtual . . .
Networks are dynamic, constantly changing with the addition of new devices and services--each with vulnerabilities and risky configurations. Vulnerability assessment tools that take snapshots don't reflect this ceaseless flux. That's where Tenable Network Security steps in, taking a completely passive approach . . .
Heightened awareness of security issues on the part of IT administrators is, for the most part, a good thing. But there is a downside -- it has pushed vendors to integrate security into products ad infinitum. In the switching world, newly added features of layer 3 routing switches are starting to make these products resemble firewalls.. . .
Today, Halloween, marks the debut of Devil-Linux 1.0, a runs-from-CD (or USB flash device) firewall/router distribution designed to give you a large amount of security in return for very little setup work. The Halloween release date and the 'Devil-Linux' name . . .
Intel will launch a new motherboard this week containing a Trusted Platform Module (TPM), which is an electronic safe that can store encrypted keys to sensitive documents and personal information.. . .
Secure Linux operating system and software provider Trustix was today acquired by internet security company Comodo. Financial terms of the deal were not disclosed. Comodo, which is best known as a certification authority for SSL certificates, said that the deal will . . .
This certification is another step in IBM's initiative to provide secure products for government and other high-assurance organizations. In August, IBM and SuSE Linux announced that SuSE achieved the first security certification of Linux. IBM Directory Server, AIX and advanced security . . .
By definition, it's rare to hear a CEO say something like, "There's not another major technology company that's shown the revenue and earnings growth we've shown the past four years." But John Thompson of Symantec says it matter-of-factly, with obvious pride . . .
Sun's chief security officer last week said that vendors should bear legal responsibility for any security vulnerabilities found in their software, and should work harder to build more secure platforms and applications.. . .
Big Blue said its wireless intrusion detection service is designed to help customers protect themselves against security breaches on wireless local area networks. The service includes Linux-based sensors that detect irregularities in the wireless network and identify unauthorized or unsecured access . . .
Microsoft's next-generation security initiative, dubbed "Securing The Perimeter," includes a major update of the Windows Server Software Update Service (SUS) during the first half of 2004 and partnerships with firewall vendors to deflect future attacks, the company's software management chief said.. . .
Researchers at the University of Pennsylvania have developed smart credit cards with embedded microchips. What's new about is a technique which lets ordinary card users program in their own spending parameters.. . .
The proprietary security system used by Cisco Systems Inc. to protect wireless LANs widely deployed by enterprises can be defeated by a "dictionary attack" designed to crack passwords. To counter the security threat, the company is warning customers to institute strong . . .
"Motorola is putting Windows on cell phones, and 60 percent of banks say they are going to run their ATMs on Windows in the next few years," says Richard Stiennon, vice president of research for Gartner. "The insanity has got to stop." Symantec's latest report on Internet security paints a gloomy picture of the dark side of information technology. . .
Mr. Hornik discovered remote vulnerability in OpenSSL package provided by RedHat. Because of nature of this bug some other vendors can be vulnerable too. This vulnerability is inside SSLv2 server code and allows . . .
Micael S. Mimoso submits Recently disclosed vulnerabilities in OpenSSL could leave systems open to denial-of-service attacks at the minimum and, at worst, remote compromises. Experts recommend that users of affected systems upgrade to OpenSSL 0.9.7c or 0.9.6k. Other . . .
This three-part article will focus on identifying and exploiting vulnerabilities and poor configurations in Cisco routers. We will then discuss the analysis of the router configuration file and will attempt to leverage this access into other systems. Additionally, we will cover . . .