New online risk-monitoring and strong-authentication technologies are helping banks meet looming FFIEC online authentication deadlines
CA is recommending that users of its popular eTrust Antivirus WebScan upgrade to protect against flaws that can allow a remote attacker to execute arbitrary code or compromise the integrity of the WebScan software.
Like a game of chess, app security boils down to a series of attacks and countermoves, and developers need to do what they can during production before they become another hacker’s pawn. But one expert says that's easier said than done.
Companies are increasingly deploying filtering technology to address a number of information security threats, ranging from in-bound spyware to unapproved use of VoIP.
No patch is available yet for a Microsoft Windows flaw that could allow a remote attacker to crash the system and produce a blue screen.
The old adage, “there’s nothing to fear but fear itself” is seldom accurate in the IT industry. Obviously, Franklin D. Roosevelt never had to secure a Web site in his lifetime. With the risks in today’s world, one company is taking the “fear” out of Web services with improved app scanning software that puts the developer in the driver’s seat.
Experts have long said that AJAX, used to increase and speed site interactivity, could also be used to amplify attacks against outward facing Web apps—particularly against providers of Software-as-a-Service.
The antivirus software selected by more than one-third of companies throughout the United States and Europe was the subject of a serious security flaw earlier this year, leaving its users in the dark. McAfee publicized the flaw and its fix through an apologetic e-mail issued to its customers last week.
Creating more secure apps is a laborious process, as is justifying the related expenditures to senior management. To learn how companies can better facilitate such processes, we talk to Dr. Herbert H. Thompson, the chief security strategist of Wilmington, Mass.-based Security Innovation Inc., an application security services provider.
Spyware is the fastest-growing threat to enterprises, increasing more rapidly than Trojans, viruses and other risks. And experts believe spyware will stick around.
Protegrity touts Defiance Security Software, Suite 4.1, as the most comprehensive security software available to date, enabling users to implement an all-encompassing method of data protection and business apps.
Reduce maintenance costs from security logic that is interwoven with application logic. Apply a simple design that lets you plug in a role-based access control component.
This summer AOL plans to add two tools to its repertoire to provide users with firewall, antivirus and antispyware security—tools that will likely rival similar products from Symantec, McAfee and Microsoft.
Ounce 4.0—built on the company’s source code analysis engine and security knowledgebase—marks the industry’s only enterprise-level architecture for software security assurance.
Vista’s arrival will shake up the $3.6 billion Windows security market. Here are the implications for IT managers.
The IT security landscape is about to be hit with a potentially devastating seismic shift: the convergence of phishing e-mails and spyware that could take the bad guys to a whole new level.
Vista’s arrival will shake up the $3.6 billion Windows security market, according to Yankee Group. With more security built into Microsoft’s next operating system, many enterprises will jettison at least some of the third-party Windows security products they use, to save money and management time. What are the implications for IT managers?
There's a renewed focus on application security, but experts say most enterprises still don't have a handle on how to go about fortifying their apps. That's partly because getting control of the app-dev lifecycle to add security measures is just plain tough.
More important than ever, intrusion detection and prevention systems offer new ways to reduce data overload and false alarms.
A newly discovered vulnerability in Microsoft Word XP and Word 2003 allows malicious hackers to mount Trojan-based attacks through e-mail attachments, establishing a backdoor that allows them to control compromised Windows PCs.