Dennis Fisher

AppRadar 2.0 Detects App-Level Attacks

As attackers continue to move beyond Web and mail servers in their search for vulnerable hosts to compromise, security vendors are rolling out advanced solutions designed to shield sensitive databases from application-level attacks. Application Security Inc., one of the first vendors in the space, will introduce Version 2.0 of its AppRadar product this week. The […]

New Breed of Tools Locks Down Enterprise Content

Enterprises looking to safeguard intellectual property on corporate networks are looking beyond simple search appliances to an emerging breed of content analysis and monitoring tools designed to control sensitive business data. Reconnex Inc., Vericept Corp. and Tablus Inc., part of a small group of companies that helped establish the market for enterprise content monitoring, are […]

IPSes are Coming of Age

Four years ago, the intrusion prevention system market consisted of a few next-generation intrusion detection system appliances with elementary blocking capabilities. Most vendors and analysts at the time said IPSes would remain a minor offshoot of the IDS segment, mainly because administrators were loath to run appliances that could block network traffic actively. Those predictions, […]

Hacker Mudge Returns to BBN

Security industry veteran and itinerant hacker Peiter Zatko decided this week to rejoin Internet pioneer BBN Technologies Inc. as a research scientist. Better known in security circles as Mudge, Zatko was one of the founding members of the L0pht Heavy Industries hacking team that later became the technical heart of @stake Inc. He left @stake […]

CipherTrust Keeps an Eye on URLs to Track Spammers

As the larger security vendors begin rolling out first-generation reputation services in their anti-spam systems, CipherTrust Inc. this week plans to introduce Version 3.0 of its TrustedSource reputation service, which can now assign a reputation to any IP address on the Internet. The system, an upgrade to the software on the companys IronMail appliances, works […]

New Virus Attack Technique Bypasses Filters

Virus writers have once again gotten the drop on anti-virus vendors and IT administrators with a new technique thats finding early and considerable success. Late last month, administrators and service providers began seeing virus-infected messages with a new type of attachment hitting their mail servers: an .rar archive. .Rar files are similar to .zip files […]

CA Plows Ahead with Business-Unit Restructuring

Computer Associates International Inc. last week acknowledged its plans to reorganize around a business unit structure and move two top executives into new roles, but at least one of those changes may be temporary. “The business unit structure has proven itself an incredibly effective model in this industry and is a natural next step for […]

Sun Targets Regulatory Compliance

Sun Microsystems Inc. this week plans to unveil a new piece of its expanding identity management product designed to help customers get a handle on ever-increasing audit and regulatory compliance requirements. Federal and state regulations, including HIPAA (Health Insurance Portability and Accountability Act); the Sarbanes-Oxley Act; and the California Security Breach Information Act, or SB […]

Aventail Revs SSLs

In the last year, the Secure Sockets Layer VPN market has exploded, going from a niche in the larger VPN sector to a pervasive technology now deployed in many of the worlds largest networks. Aventail Corp., of Seattle, one of SSL VPNs pioneers, has been at the forefront of this push into the enterprise and […]

DHS Shake-Up Augurs Security Shift

The sudden resignation of Department of Homeland Security section chief Robert Liscouski, paired with the introduction of a new bill in the U.S. House to give more authority to the countrys top cyber-security official, could help pave the way for the DHS to attract a senior IT executive better equipped to improve federal information security […]