Security News


SHARE: Businesses Still Not Taking Spyware Seriously

Most businesses have tackled viruses, hammering best practices into their users and implementing anti-virus software. However, these same enterprises and their users still don’t realize spyware’s potential damage, according to a session at a recent SHARE user conference in Boston.

Software to Cloak Code from View of Bad Guys

Cloakware has expanded language support for its Cloakware Security Suite to include C, C++ and Java, extending the range of code that can be protected from reverse engineering when the software is stored on a disk, and against tampering when the software is stored on disk or running in memory.

Retailer Busts Lines with New Inventory System

Sales associates at Gordmans, an apparel and home fashions retailer, found they were spending more time waiting for inventory data than they were spending on customers.

SOA Software’s “Service Virtualization”

A service-oriented architecture (SOA) takes the discrete business functions in enterprise applications and organizes them into interoperable services—which is one of the most effective ways to share and consume information with partners. But managing and exposing these services creates some big security risks; keeping the bad guys from connecting to those services is tricky.

Arbor Networks Tracks User Activity

Arbor Networks is introducing an anomaly detection and internal intrusion prevention system that traces inappropriate behavior back to users—down to their names.

CodeAssure 2.0 Automates Security in the App Layer

“Viruses are bad and worms are worse, but these broad types of attacks just aren't having the same negative financial impact on the enterprise as the growing number of targeted attacks against the application layer," says John Pescatore, an analyst at Gartner.

Developers, Biz Must Focus Security on Entire App Lifecycle

Application security must be the top priority for developers and business throughout the product development lifecycle. That was the gist of Symantec’s recent Webcast, “Securing the Development Phase of the Application Development Lifecycle.”

Oracle Integrates Fusion Components for Web Services Security

Much discussion about IT security centers around the idea that developers should build secure applications. It makes sense; more than ever, attackers are targeting vulnerabilities in the application layer. But in an increasingly service-oriented world, in which monolithic applications are being broken down into smaller pieces for reuse, is it practical to expect developers to code security into individual Web services?

Interest in ITIL Framework Skyrocketing

With internal auditors breathing down their necks over compliance and security issues, many large companies are eager for help organizing IT operations infrastructure. That helps explain the mushrooming popularity of the Information Technology Infrastructure Library.

Another Take on Token-Based Security

Hardware-based two-factor authentication has been around for about two decades, but interest in sign-on solutions that require something you know (your password) and something you have (a hardware token) has recently gotten some serious gotten mass-market attention.

Don’t Let Your Applications Get You Down

Exploited software flaws cost the U.S. financial services industry more than $3 billion per year, according to the National Institute of Standards & Technology.

Does XML give away the keys to the warehouse?

Data security is a matter of good architecture, and XML doesn’t do anything to aggravate security problems.

Public Key Crypto in an XML Framework

The World Wide Web Consortium recently approved XML Key Management System 2.0, adding public key management to the W3C XML Security Framework.

Trend Micro Offers Enterprises Another Weapon Against Malware

Trend Micro is delivering an upgraded version of its InterScan Web Security Suite that the company says will stave off viruses and other Internet threats that continually target enterprises.

Kenai Systems Automates Web Services Vulnerability Testing

The good thing about Web services is that they expose interfaces, streamline connections and accelerate business processes. The bad thing about Web services is that they expose interfaces, streamline connections and accelerate business processes.

Parasoft Adds Penetration Testing to SOAPtest

Few software companies have beat the security-begins-in-the-application-development-process drum louder than automated software testing solutions vendor Parasoft Corporation. “Prevent errors as you write the code,” is the company mantra (if not exactly its slogan). The advent of service-oriented architectures that support wide-scale use of Web services makes that message even more urgent, says Wayne Ariola, Parasoft’s VP of corporate development.

IPLocks Lays Down the Seven Laws of Risk Management

In 2002, when IPLocks was founded, the enterprise database security conversation was all about perimeters and encryption, and the company’s products reflected that focus. But the conversation has taken a turn in recent years. Organizations are concerned about internal intrusions, the misuse of sensitive information by trading partners and sustaining regulatory compliance. IPLocks has responded to that shift with a broader approach, says CTO Adrian Lane, which it calls information risk management.

RSA Provides Policy-Based Approach to App Security

Why do so many application development organizations push security to the back of the bus? One reason, says Gartner analyst Ray Wagner, is that security requires a level of expertise most developers don't have.

Unencrypted Backups Can Be Worse than Worthless

When Iron Mountain lost 40 backup tapes containing personal information about 600,000 current and former employees of Time Warner earlier this year, it grabbed headlines, but it wasn't such big news. The Time Warner incident came just weeks after Bank of America reported losing backup tapes containing financial information about more than 1.2 million federal employees, including 60 U.S. senators. And a month before that, Ameritrade acknowledged losing backup tapes containing information about 200,000 clients.

Traveling at a Zillion Events Per Second

SIMs collect raw data from security-related software and systems, correlate it, aggregate it and then present it in a way that makes it actionable.