Former White House security advisor Howard Schmidt on Wednesday announced the formation of the Global Council of CSOs, a group of 10 security experts that will address issues of national security, business continuity and technology development.
Shock waves are still reverberating from a report issued in June predicting the demise of IDS technology by 2005. But Security Guard columnist Paul Desmond says IDS really isn't disappearing.
When IT pros start adding up the real costs of addressing security vulnerabilities, they may be in for an unpleasant surprise. It's enough to make them demand better quality software -- or at least, it should be.
Answer: Yaha, Klez, Lovegate, Bugbear and Backdoor.
Question: What are five reasons Datamation readers selected Symantec AntiVirus Corporate Edition 7.6 as the Security Product of the Year?
A recent META Group study underscores what many of us already knew: email is now a more important business communications tool than the telephone. If that's the case, then email security must be an increasingly important priority.
It's clear why the federal government released its 'National Strategy to Secure Cyberspace' document with so little fanfare -- because there isn't much to brag about.
CipherTrust announces a new release of its IronMail secure email appliance that adds new spam-fighting features intended to drive up spam detection rates while reducing false positives.
Nortel Networks announces new switches and switch modules that bring SSL acceleration and SSL-based virtual private network capabilities to its Alteon and Passport switch lines.
RAT, Commercial RAT, Nuker, Mail Bomber, IRC War. No, these are not the handles of players in some ultra-violent computer game. Rather, they are 'pests,' and they are a growing security problem, according to PestPatrol Inc.
With a series of announcements over the past couple of weeks that culminates later this month with a joint announcement with RSA Security, PKWare is making headway on its vision of seeing the ubiquitous ZIP format used enterprise-wide for file encryption as well as compression.
In what amounts to the first tangible fruits of its acquisition of the Gauntlet firewall from Network Associates nearly a year ago, Secure Computing announces a new 'hybrid' firewall and an appliance for managing hundreds of distributed firewalls.
ActivCard announces software that integrates multiple authentication techniques to simplify the process of providing secure, single sign-on access to enterprise systems and applications, as well as to Web sites and resources outside the control of IT.
Tumbleweed Communications announces an appliance that runs its MMS 5.5 software, which provides content filtering, secure email, anti-virus and anti-spam capabilities.
Enterprise management products vendor BMC Software announces enhancements to its CONTROL-SA provisioning tool that focus on ease of use and deployment as well as scalability and integration.
Remote access vendor Aventail unveils an SSL-based VPN appliance it claims ups the ante in the 'clientless' VPN market, with features enabling it to replace more complicated IPSec-based VPNs for remote user access to networks.
Internet security product vendor SonicWall announces a pair of new security appliances targeted at the small/medium business market and featuring enhanced firewall and administrative functions.
The recently passed Cyber Security Research and Development Act aims to provide nearly $1 billion for various forms of security research and scholarships. But it's no sure bet that Congress will vote to fund the legislation.
A new Internet risk assessment report paints a grim picture of the state of Internet security and warns of persistent threats to come from new forms of mass-mailing worms.
Two high-profile multimedia software companies release patches for vulnerabilities in their respective products that may result in buffer overflows.
Thor Technologies announces a new version of its Xellerate provisioning system that adds features to make the platform easier to implement and ensure reliability in the provisioning process.
PKWare announces a free, Windows-based reader that allows anyone to open any ZIP file and decrypt those secured with the company's PKZIP 5.0 Professional Edition.
NT OBJECTives announces a Web server security assessment and defense toolkit built out of a collection of freeware tools and priced at just $999 per year for unlimited enterprise use.
Security device vendor Fortinet announces it will offer virtual private network client software that simplifies enterprise deployment of VPNs based on its Network Protection Gateway (NPG) security appliances.
Massachusetts-based OpenService unveils a bundled suite of security threat management tools intended to be simpler to deploy and operate than previously separate products.
PGP Corp. releases 8.0 versions of its PGP (Pretty Good Privacy) encryption technology for Windows and Macintosh desktops, enterprise and personal use. In a throwback to its open source roots, the company also released PGP 8.0 source code for peer review.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?