Vendors/Products - Page 68
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A Columbia company that invented what it calls the world's most widely deployed technology to detect computer hackers announced yesterday that it received $7.6 million in venture capital to develop and market a commercial version of its product. Sourcefire, a 30-employee, privately held company, uses Snort, a detection technology developed by the company's founder, Martin Roesch.. . .
In the wake of the Apache Chunk Encoding vulnerability, the fun just doesn't seem to end. There seems to be another worm on the loose. The details of it are still being investigated. Currently, there is a thread on . . .
In my line of work it is inevitable, but always shocking, to see the number of high-risk security flaws developers have left behind. Most worryingly, a major proportion of vulnerabilities are due to a basic misunderstanding of the internet protocol and . . .
At least one major security vulnerability exists in many deployed OpenSSH versions (2.9.9 to 3.3). Please see the ISS advisory, or OpenSSH advisory on this topic where simple patches are provided for the pre-authentication problem. . . .
Update:Another follow up statement was written by ISSAtlanta also issued through Bugtraq. Apparently ISS is still recieving emails about this issue.. . .
The recent situation regarding the Apache chunk encoding vulnerability has caused plenty of controversy in the security industry. It initially began with the community dislike of the release of information. Then it was debated as to weather or not this was really an exploitable. . .
When designing Web sites, developers usually focus on the appearance and the back end. And they generally rush to get their e-commerce sites to production, often at the expense of adequate security and testing. In fact, Web applications are the weak . . .
Setting up a secure server isn't necessarily for the faint of heart. To make it easier for IT administrators, Guardian Digital Inc. has released EnGarde Secure Linux Version 1.2, offering a secure server operating system for mail, Web and other servers without the hassle of an intricate customization.. . .
IBM has developed software which it claims can effectively prevent drive-by hacking. Software developed by IBM Research in the US apparently turns servers into wireless auditing sniffers that alert administrators if a network has misconfigured wireless access points. The . . .
Feeling a bit insecure these days? Boy, do we have a cure for you! Just read this issue cover to cover, and I guarantee a secure feeling will wash over you. Of course, it'll then be your responsibility to use this newfound knowledge to apply security in just the right amounts for your IT infrastructure. If you use wireless technology, run Linux or are considering an MPLS-based VPN service, read on. . . .
IBM is delivering new capabilities across its Tivoli security management software portfolio, including IBM Tivoli Access Manager, IBM Tivoli Risk Manager and IBM Tivoli Identity Manager, that enable organizations to make secure access, threat and identity management more effective in heterogeneous environments.. . .
EnGarde walked away with our Editor's Choice award thanks to the depth of its security strategy, which covers nearly all the bases. Everything from the low-level mechanisms (binary integrity checking and stack protection) to high-level usability issues (including an excellent patching interface) demonstrate the serious effort the Guardian Digital crew has invested in EnGarde. . . .
Yankee Group senior analyst Anil Phull told NewsFactor that the best practice for companies using biometric devices is to deploy them with other identification tools. Biometrics have long been the basis of the ultimate security technologies in science fiction -- but can these safeguards, which rely on fingerprints, eyeballs and other personal traits to authenticate users, really secure the enterprise?. . .
This is the second time TurboLinux has let security support for its US products lapse for an extended period, the first being about two years ago, when budget cutbacks resulted in the Linux distribution security staff at TurboLinux being let go. It was not until several months later that new security staff was hired (at the time only a single person) and security updates for the products were made available once again.. . .
Jim Azevedo writes, "NeoScale Systems, Inc., a provider of enterprise storage security solutions for the burgeoning network storage market, today announced the formation of its technical advisory board - comprised of accomplished and recognized contributors to the storage and security industries.. . .
Growing security concerns within the enterprise communication market are challenging chipmakers to develop advanced, silicon-based encryption techniques that will not erode processor performance.. . .
A slew of vendors this week will take the stage at NetWorld+Interop 2002 Las Vegas to highlight new products and services aimed at making networks safer. Vendors are looking to simplify this important task by processing multiple security applications on a . . .
Rafael Peregrino da Silva writes, "T/bone SecureMail Gateway allows digital signature and encryption for the entire email traffic of a company with a single organizational certificate. This server based solution works transparently for end users. T/bone automatically finds certificates . . .
Biometrics vendors are doing their best to supplant passwords as the chief form of computer security, but Government Computer News Lab tests indicate that many of their products are not quite ready. Some developers have continued to improve already good devices, . . .
Angela Schwartz writes, "Netlock Technologies develops Contivity VPN Clients for Macintosh, Linux, Solaris, HP-UX, and IBM-AIX. No other company offers the breadth of VPN client operating system support that is available with the Nortel VPN Switch. . . .