spacer spacer
HOME ARTICLES REVIEWS IT TOOLS NEWS RELEASES ADVERTISING
You are here: IT-Observer RSS | White Papers | Submit News   
Trend Micro Mobile Security 3.0
The expanding growth of converged mobile devices, increase availability of Wi-Fi networks and the faster download speeds are likely to increase the number of threats to these sorts of devices.

Friday, 17 November 2006 05:09 EST | Reviews

Policy and Compliance in The Workplace
Compliance. Regulation. Security. These are the reasons why organisations write policies. But how can you be sure that staff have read, understood, and agreed to policy? And how can you demonstrate policy compliance to auditors and regulators? Posting policies on the intranet, or relying on emails or staff handbooks leaves policies ignored, and impossible to track.

Monday, 13 November 2006 11:39 EST | Information Security

Web-style Wireless IDS attacks
Wireless intrusion detection systems (WIDS) are not yet as popular as their wired counterparts, but current trends would suggest that their number is set to grow. One positive factor in this respect is the integration of such programs with active network equipment and Management awareness of the risks associated with the unauthorised use of wireless devices.

Thursday, 9 November 2006 02:10 EST | Mobile and Wireless

Sex, Spies and Hard-Drives - Wipe Data Properly
On average, 70% of re-sold hard-drives and memory cards contain pornographic material according to research carried out on 1,000 hard-drives over the course of a year by Disklabs Data Recovery and Computer Forensics.

Wednesday, 8 November 2006 01:50 EST | Information Security

Interview with Marc Maiffret, CTO of eEye
In this interview Marc Maiffret, Co-Founder and CTO of eEye Digital Security, discusses endpoint security and its ramifications on the enterprise. eEye is the developer of Blink - the first unified client security agent.

Tuesday, 7 November 2006 02:24 EST | Editorial

802.11b Firmware-Level Attacks
Denial of Service (DoS) attacks are a common threat to 802.11 wireless networks. Using widely available software and an inexpensive wireless LAN card, an attacker can halt the service of a wireless LAN at their whim. While very effective, these tools lack persistence in their operation when the attacker stops the attack or leaves the range of the victim network, client workstations automatically resume their connectivity to the network.

Monday, 6 November 2006 02:17 EST | Information Security

Data, data, everywhere - Securing back-up
spacer Every day, organizations give backup copies of their data to a van driver. Media is often left in reception for collection by anyone who asks. Systems and their data are backed up so that they can be restored. Standard hardware and software can be used to reproduce corporate data and systems anywhere.

Monday, 6 November 2006 02:12 EST | Information Security

Archive
GFI LANguard Network Security Scanner - Is your network open to attack? Find out with the #1 sold network security scanner: GFI LANguard Network Security Scanner! Download your FREE trial version today.

Visit GFI Security Software page for more information.

IT-Gear.com - Weblog dedicated to everything concerning IT tools and services.

 

Latest Tools

  • bitShifter 1.1.1
  • 1Passwd - Password Manager 2.0.3538
  • Password Manager XP - store passwords securely
  • Cyberhawk - zero-day protection software
  • UserLock: Manage Networks Access Control
  • BeEF - Browser Exploitation Framework 0.2.1

Latest News

IronPort stops 98% of image spam
15.11.06  IronPort has announced significant progress in the war against image spam.

Qualys offers free security scan for the new SANS Top 20
15.11.06  Qualys has today the availability of a free network scanning service to help companies find and eliminate vulnerabilities listed in the annual SANS Top 20 update for 2006.

MySQL and NitroSecurity to develope Database Storage Engine
14.11.06  MySQL AB and NitroSecurity have announced they have signed a strategic agreement to jointly develop and market a database engine for MySQL based on NitroSecuritys NitroEDBTM extreme performance relational database technology.

VolumeShield announces AntiCopy Version 2.5
14.11.06  VolumeShield has announced the latest release of AntiCopy Enterprise Edition.

FaceTime secures enterprise Internet use
14.11.06  FaceTime Communications has announced FaceTime Internet Security Edition to provide enterprises with total security and control over Web and real-time Internet communications.

Breach Security unveils ModSecurity-based Appliance
14.11.06  Breach Security has announced the release of the ModSecurity version 2 open source web application firewall on an appliance delivering the lowest cost commercial web application firewall available.

Trend Micro upgrades its Mobile Security Suite
14.11.06  Trend Micro has announced the addition of new security features within Trend Micro Mobile Security.

Copyright © IT-Observer Online Publication 2000 - 2006 Top | RSS Feeds | About Us   
spacer
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.