Brian Prince

Future of TPM Technology Discussed at RSA Conference

Members of Trusted Computing Group, a 170-member organization dedicated to developing trusted computing standards, touted Trusted Platform Modules, to an attentive, if sometimes skeptical, audience at the RSA Conference on Feb. 5. Roger Kay, president of Endpoint Technologies Associates and author of a white paper titled “Trusted Computing is Real and Its Here,” sought to […]

Verizon Firewall Gives Users Freedom to Adapt

Verizon Business is launching a network-based custom firewall to allow customers to adjust the security settings across their global IP networks on their own. Verizons Secure Gateway Firewall services can be used with all four Verizon Business networks—Private IP, vBNS+, Frame Relay and ATM—allowing customers to extend their communications reach by securely exchanging traffic between […]

CSIA Gives Government Poor Marks on Security

The Cyber Security Industry Alliance in its latest annual report (PDF), released Jan. 31, is pressing for the federal government to be more aggressive in its efforts to protect sensitive information in cyberspace. In its 2007 Agenda for U.S. Government Action, contained in the annual report, CSIA officials call for Congress and the Bush Administration […]

Data Security Firms Ally to Promote Standards

Eight leading data security companies have joined forces to create an organization to educate the business community on the value of global security standards that protect credit and debit card numbers. The newly formed Payment Card Industry Security Vendor Alliance will assist the PCI Security Standards Council—an organization composed of merchants, banks and point-of-sale vendors—in […]

Trend Micro Targets SMBs with Security Offering

Trend Micro, a leader in anti-virus and Internet content security, is making the latest version of its trademark all-in-one defense against Web-based threats available Jan. 29. Trend Micro Client Server Messaging Security 3.5 is aimed specifically at meeting the security needs of SMBs (small and midsize businesses), company officials said. Offering protection against spyware, rootkits […]

Zimbras Open-Source Collaboration Suite Boosts Security, Tools

Zimbra, a maker of open-source collaboration and messaging software, Jan. 29 announced the launch of Zimbra Collaboration Suite 4.5. “We are excited to see broad interest in Zimbra from small businesses, universities, enterprises, business hosting providers and ISPs,” Satish Dharmaraj, CEO of Zimbra, said in a statement. “The 4.5 release is dedicated to providing more […]

Cenzic, Borland Team Up on Secure Application Development

Security solution provider Cenzic has integrated its Hailstorm software into the newly available Borland Gauntlet—a move that seeks to help IT organizations to proactively uncover security vulnerabilities and enforce security policies throughout the software delivery life cycle. Starting Jan. 29, customers who download Borland Gauntlet will also be able to download a trial version of […]

IBM Software Aims to Prevent Online Identity Theft

Researchers at IBM have created a new shield for personal information in an effort to prevent identity theft online. Code named Identity Mixer, or Idemix for short, the software was crafted by IBM researchers at the companys laboratory in Zurich, Switzerland, and will let customers purchase goods and services online without revealing their personal information. […]

Cybertrust Offers EV SSL Certificates for Safer Online Transactions

Global information security company Cybertrust on Jan. 25 launched its extended validation secure sockets layer certificates for Microsoft Windows XP and Vista users. The announcement comes on the heels of Entrusts release of its EV SSL certificates Jan. 18. Businesses utilizing Cybertrust EV SSL Certificates will enable their customers using IE 7 on Microsoft Windows […]

Cisco Addresses Flaws in IOS

Cisco is providing patches for its popular Internetwork Operating System in response to the discovery of three flaws, the most serious of which would allow hackers to insert malicious code in order to corrupt devices running IOS. The company addressed the flaws in a series of advisories released Jan. 24. According to Cisco officials, the […]