Logicalis has been recognised for its cutting edge technology implementations at the 2006 Channel Network Awards. The Integrated Security Solution Award was presented to Logicalis for its work with Lewisham Primary Care Trust (PCT) in delivering the first biometric security solution to a PCT in the UK.
Inqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.
Records are paper or digital documents or forms that provide evidence of the activities of organisations and individuals. They are created during normal business activities, and are maintained to comply with regulations and to support operations. Capturing, maintaining and keeping records mean that essential information is available to safeguard the organisation’s interests.
New independent research, the second annual BridgeHead Software Information Lifecycle Management (ILM) Audit, confirms that significant IT data growth continues unmitigated.
ScriptLogic Corporation, a leader in network administration software for Microsoft Windows-based networks, today announced that it ranked Number 188 on the 2006 Deloitte Technology Fast 500, a listing of the 500 fastest growing technology companies in North America. Rankings are based on percentage revenue growth over five years, from 2001-2005.
Application Security has announced Oracle on Linux support in AppRadar – the comprehensive database activity monitoring and security auditing solution. AppSecInc made the announcement in conjunction with Oracle OpenWorld, taking place this week at the Moscone Center in San Francisco.
Astaro Corporation displayed a beta release of Astaro Security Gateway V7 at the Munich trade show Systems 2006. Transparent email encryption, a new graphical user interface, sophisticated bandwidth management, and automatically configurable high availability mechanisms are the main innovations of the latest release.
Today’s enterprises characterized by a proliferation of easily accessible computer ports, such as USB and PCMCIA. In addition, a variety of communication adapters such as wireless and Bluetooth and other storage devices such as digital cameras, smart phones and PDAs all enable effortless access to endpoints.
In part 1, we introduced the idea of a Less-Than-Zero threat and defined it relative to a Zero-Day threat. Now, I´ll go a little deeper on each and discuss ways to protect your organization from them.
The security industry and trade press have directed a lot of attention toward the “Zero-day attack,” promoting it as THE threat to guard against. According to the marketing hype, the Zero-Day attack is the one that you should most fear, so you must put in place measures (i.e., buy stuff) to defend your organization from… Read More »