StillSecure®, provider of an award- winning, integrated suite of enterprise network security solutions, today announced VAM™ v5.5, the newest version of StillSecure’s vulnerability management platform. v5.5 features a dramatic increase in the number of users, devices, and scans that VAM can manage concurrently.
Stellar Information Systems Ltd. today revealed that about 97% of its customers were satisfied or extremely satisfied with their data recovery product performance. Stellar conducted a survey and the overall objective of the study was to gain a strong understanding of how well are the Stellar products performing in the minds of their customers. The… Read More »
Once again it´s down to the IT manager to manage the policies and ensure that they are followed whilst not hampering the productivity of users. Thankfully automated tools can now help in this task and can restrict the use of specific applications or services and track application usage on a by-PC basis.
The rise of life-style technologies, such as the ubiquitous iPod, has also given birth to a new type of security threat via the USB port. MP3 players are in reality portable memory devices, which are capable of downloading and storing vast amounts of data from a corporate network – as is every laptop.
No-one in business today can be unaware of the compliance challenges facing the IT team in protecting company assets and processes. The statistics are clear, abundant and all around us, leaping from headlines on a daily basis; massive financial losses associated with security non-compliance are commonplace, as are high-profile court cases about staff misuse of… Read More »
A programmer going on by the name muslix64 has posted a Java-based application that will free the encrypted video from its protection.
Akonix Systems, the provider of the most deployed instant messaging (IM) security and compliance products in the world, today announced its Security Center (www.imsecuritycenter.com) researchers tracked 16 attacks against IM networks in July, bringing the total number of attacks during 2006 to 127.
Web 2.0 is causing a splash as it stretches the boundaries of what Web sites can do. But in the rush to add features, security has become an afterthought, experts say. The buzz around the new technology echoes the ´90s Internet boom–complete with pricey conferences, plenty of start-ups, and innovative companies like MySpace.com and Writely… Read More »
Phishers launched a record number of attacks in January 2006, as reported by the Anti-Phishing Working Group. These attacks often take the form of an email that purports to be from a trusted entity, such as eBay or PayPal. The email states that the user needs to provide information, such as credit card numbers, identity… Read More »
By using specially crafted parameters (in double quotes) it is possible to bypass the input validation of the package dbms_assert and inject SQL code. This makes dozens of already