Vendors/Products - Page 69
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Executives at Linux security company Cylant say the computer security industry is engaged in a "conspiracy of sorts," or at least a conspiracy of ignorance, in taking a reactive approach to fighting vulnerabilities. Cylant is pitching its CylantSecure server monitoring . . .
Network security is not a technological problem; it's a business problem. The only way to address it is to focus on business motivations. To improve the security of their products, companies - both vendors and users - must care; for companies to care, the problem must affect stock price. The way to make this happen is to start enforcing liabilities.. . .
Problems with Microsoft Corp.'s Windows Update are causing the automated scanning service to mismanage patches, leaving IT managers to wonder whether the systems they thought were safely patched are actually vulnerable. WU, which was originally meant for consumers but is used . . .
Ernst & Young LLP, one of the world's largest professional services firms, today announced the schedule for the seventh year of its acclaimed eXtreme Hacking courses, which allows information technology professionals to gain hands-on experience with techniques that a "hacker" might use to attack and penetrate a corporate network.. . .
Crossbeam Systems, Inc., announced general availability of version 2.0 of the Crossbeam X40S, the first "open appliance" for providing a complete, high-performance security solution composed of multiple "best of breed" applications from leading independent software vendors (ISVs). Initial enterprise and service . . .
Microsoft released the Baseline Security Analyser (MBSA), a free tool which analyses Windows systems for common security misconfigurations, earlier this week. But users have already slammed it as just a GUI version of the software giant's HfNetChk.. . .
The fact is, both sides have their share of problems--but neither side has the edge when it comes to fixing security holes. You're just as likely to encounter a security problem with open source code as you are with Microsoft Windows, and the fix is just as likely to appear quickly and be done properly.. . .
... despite the paramount importance of SSL certificates, hosting companies have had few options when it comes to purchasing them. Until late 2001, Web hosts typically had two main choices: VeriSign or Thawte. With the entrance of 2002, however, the battle to secure the Web servers of hosting companies, their clients and other large-scale enterprises finally seems to be heating up.. . .
A warning about the security flaw identified Monday in the zlib compression/decompression library affecting Linux systems (see story) has been broadened to include Windows and any other other operating systems that use the zlib code. In an update about the flaw on their Web site, the authors of the zlib library said they have learned that the code is used in far more programs than they originally believed.. . .
A security flaw in open-source software used by Linux and Unix systems for compression may affect some Microsoft products that also use the code. As reported earlier this week by CNET News.com, a flaw in the zlib software-compression library could . . .
Pretty Good Privacy will go on, despite a move by Network Associates to shelve the encryption product after it couldn't find a buyer, PGP inventor Phil Zimmermann says. Although Zimmermann sold PGP to Santa Clara, California-based NAI in 1997, the protocols for the encryption code are open to all on the Internet.. . .
A company called Bodacion Technologies is offering $100,000 to anyone who can crack their biomorphic number generator and predict the final, one-thousandth, number in a sequence of 999. The company is dong this to promote its Hydra server, which uses biomorphic . . .
Two vulnerabilities in various implementations of RADIUS clients and servers have been reported to several vendors and the CERT/CC. They are remotely exploitable, and on most systems result in a denial of service. VU#589523 may allow the execution of code if . . .
Ensuring that your systems are updated is an integral part of maintaining a secure Internet presence. Two security updates were released today for EnGarde, one for PHP and another for mod_ssl. . . .
The biggest threat to corporate security today may well be the plethora of security products that are widely deployed. This is not to say that companies should not invest in security, but rather that more attention needs to be paid . . .
TinFoil Hat Linux is a small Linux distribution that can be easily booted from a floppy disk. As from my perspective its two best sides are that you have your ring pair backuped on one place and that you can securely . . .
HP has rather less market share than CA or IBM, but is significant for its specialist products and its service capability. The company has worked hard on secure platforms, notably its Unix based Virtual Vault product. The Unix emphasis has . . .
Recently the Computer Emergency Response Team (CERT) announced that many implementations of the Simple Network Management Protocol (SNMP) are susceptible to multiple remote vulnerabilities. More than 200 vendors implement this protocol in a manner that can be exploited. . . .
The creator of the popular open source intrusion detection system gets megabucks in venture capital for a Snort start-up. The commercial potential of open source security products won a financial vote of confidence last week when the author of the hacker-busting . . .
Storage security will become an "imperative" this year as the adoption of Internet technologies undermines the comforting notion that storage networks are safe from hacker attacks. In an analysis of storage security, the Yankee Group concludes that security will become an . . .