Tumbleweed Communications is taking a multilayered approach to combating data leaks and eliminating botnet-driven threats at the perimeter with the latest version of its MailGate appliance. The emphasis on detecting and thwarting botnets continues to gain steam throughout the security space. IT industry research firm Gartner, of Stamford, Conn., predicts that “by the end of […]
Hewlett-Packard expanded its security footprint June 19 as it announced plans to acquire Web application security provider SPI Dynamics the same day it unveiled its own HP Secure Advantage portfolio. HP plans to integrate the Atlanta-based SPI Dynamics business and 140 staff into the software unit of its Technology Solutions Group, the business unit also […]
Researchers at Trend Micro are reporting that as many as 10,000 Web sites have been infected with malicious code that redirects unsuspecting users to a server booby-trapped with drive-by exploits—part of a wave of attacks originating in Italy and now spreading through Europe. Dubbed the “Italian Job” by Trend Micro, the attack was first uncovered […]
Database security startup Sentrigo has released Hedgehog, host-based software that the company is touting as a shield enterprises can use to prevent data leaks. Hedgehog targets such threats from the inside, foiling data breaches caused by those with access privileges by tracking changes to a database at the object level in real time. Working in […]
p>PatchLink is planning to acquire SecureWave, an endpoint security software vendor. The merger, announced June 18, must still be approved by SecureWaves shareholders and is expected to close in the coming weeks. Made just four months after PatchLinks acquisition of Harris STAT, PatchLink officials said the SecureWave purchase will create a comprehensive security platform for […]
The New York Stock Exchange and NASD have proposed new guidelines to help companies supervise and review electronic communications. The 12-page document, released June 14, is the result of work by a committee that included representatives from securities firms. “Technological innovations in the area of electronic communications have altered how people deliver, receive and store […]
No one ever said policing the Internet was easy. Bot herders control networks of compromised computers sometimes numbering into the thousands. Already, an FBI-led initiative dubbed “Operation Bot Roast” has identified 1 million compromised computers. On Wednesday, FBI officials laid out charges against three men—Robert Alan Soloway of Seattle, James C. Brewer of Arlington, Texas, […]
Symantec is offering a new consulting service that will assess customers IT risks and offer advice on plugging the gaps it identifies. Called Symantec Foundation IT Risk Assessment, the service identifies, categorizes and prioritizes current IT risks so organizations can invest in projects that manage risk, cost and performance more effectively. The service also includes […]
As security threats continue to grow in sophistication, vendors are pounding the pavement with unified tools and promises that their products provide cost-effective and efficient ways to protect data and networks. The emphasis on unified tools is a trend that has accelerated in the past few years through acquisitions and mergers in the security space. […]
McAfee put a new version of its security management software, ePolicy Orchestrator, in its holster and is taking aim at rival vendor Symantec and its Endpoint Protection Version 11, code-named Hamlet. ePolicy Orchestrator, or ePo, serves as a management console across McAfees security products. The new version, 4.0, was made available in beta June 11 […]