Reduce maintenance costs from security logic that is interwoven with application logic. Apply a simple design that lets you plug in a role-based access control component.
This summer AOL plans to add two tools to its repertoire to provide users with firewall, antivirus and antispyware security—tools that will likely rival similar products from Symantec, McAfee and Microsoft.
Ounce 4.0—built on the company’s source code analysis engine and security knowledgebase—marks the industry’s only enterprise-level architecture for software security assurance.
Vista’s arrival will shake up the $3.6 billion Windows security market. Here are the implications for IT managers.
The IT security landscape is about to be hit with a potentially devastating seismic shift: the convergence of phishing e-mails and spyware that could take the bad guys to a whole new level.
Vista’s arrival will shake up the $3.6 billion Windows security market, according to Yankee Group. With more security built into Microsoft’s next operating system, many enterprises will jettison at least some of the third-party Windows security products they use, to save money and management time. What are the implications for IT managers?
There's a renewed focus on application security, but experts say most enterprises still don't have a handle on how to go about fortifying their apps. That's partly because getting control of the app-dev lifecycle to add security measures is just plain tough.
More important than ever, intrusion detection and prevention systems offer new ways to reduce data overload and false alarms.
A newly discovered vulnerability in Microsoft Word XP and Word 2003 allows malicious hackers to mount Trojan-based attacks through e-mail attachments, establishing a backdoor that allows them to control compromised Windows PCs.
Sunbelt Software recently released Sunbelt Messaging Ninja, its new third-generation enterprise messaging security solution for Microsoft Exchange. The product includes antivirus, antispam and antiphishing features, and attachment filtering, which is free for a limited time.
Nearly two-thirds of IT decision-makers aren’t confident they can prevent bots from infecting company PCs when they are not connected to the corporate network, according to a new survey.
ADT’s 12th annual Innovator Awards recognize the work of IT teams who developed—and deployed—unique apps to solve their company’s business problems.
Some organizational names carry inherent assumptions. Just ask the Sacramento Air Force Employees (SAFE) Federal Credit Union in California, which maintains assets of $1.2 billion for its roughly 120,000 members.
They may not be as slick, powerful or extensible as off-the-shelf reporting tools, but that doesn’t bother a growing number of developers who find open-source tools good enough.
Patching remains a manual, time-intensive process, despite more automated tools.
While teaching developers “secure coding” techniques is important, experts say far more is needed to actually produce secure applications.
Gary McGraw's New Book Puts the Yin and Yang in Application Security
Reflex Security’s Reflex VSA, which the company claims is the industry's first virtual security appliance for virtualized environments, enables enterprises to secure those networks with firewall protection and intrusion prevention.
On Monday, Counterpane Internet Security and MessageLabs released their 2005 Attack Trends & Analysis report, which analyzes security attacks across 15 industry sectors and discusses how these attacks affect organizations and outlines the extent of potential damages.
Thanks to improved corporate information security practices, attackers are seeking new methods for accessing sensitive corporate information, putting storage media more at risk than ever. We offer several recommendations for destroying data.