Brian Prince

FaceTime Looks to Deepen Control of Web 2.0 Applications

FaceTime Communications plans to expand its war on greynets in the enterprise with the addition of new capabilities meant to provide IT managers with control over 140 social networking sites, 20,000 individual Facebook widgets and more than 400 Web and real-time applications. The company announced the enhancements, which are slated to be available in its […]

Backscatter Spam Is Back

Spammers increasingly used an old standby in March to reach e-mail inboxes- backscatter. The practice is back and Symantec researchers are calling it a wake-up call for MTA (mail transfer agent) administrators. In Symantec’s monthly State of Spam report, researchers reported that an increase in bounced messages had led to spammers forging sending e-mail addresses […]

Database Monitoring Meets Vulnerability Assessment

Guardium is moving into the area of vulnerability management with the latest release of its database security and compliance platform. In Guardium 7.0, the company is looking to address the entire database security and compliance lifecycle, company officials said. “We added vulnerability management to our solution because we saw huge advantages to providing an integrated […]

Web 2.0 Security Hangover

Web 2.0 applications have certainly made the user experience more interactive, but organizations need to be mindful of their impact on Web site security. Certainly, there are a number of reasons Web sites become an attractive target for hackers; sometimes sites are built prior to an attack being known about, or the developers were in […]

Auto Parts Retailer Notifies Customers of Network Breach

Advance Auto Parts, a leading auto parts retailer, has begun sending letters to customers impacted by a data breach that may have exposed financial information of up to 56,000 people. The retailer reported March 31 that a “network intrusion” had exposed financial information and was the subject of a criminal investigation. Fourteen of the retailer’s […]

Workshare Bundles New Level of Encryption with DLP

Workshare wants to challenge other security vendors at the endpoint by including new encryption capabilities for the Workshare Protect Premium client. The company announced March 31 it is bundling its new Workshare Protect Crypto product with Protect Premium at no additional charge as part of Workshare Unified Content Protection (UCP) Suite 6. With Protect Crypto, […]

Fortify Pushes Application Security

Fortify Software is advocating a new strategy to help keep businesses secure during the software development process. Dubbed Business Software Assurance, the strategy begins with the release of Fortify 360, a suite of integrated products Fortify officials said will help organizations identify and fill security holes in their software. Barmak Meftah, senior vice president of […]

Guardium Ties Activity Monitoring to Major Data Security Products

Guardium has joined forces with a number of log and security information and event management vendors to improve visibility and analysis into security events. Guardium, which specializes in DAM (database activity monitoring), has integrated its technology with products from CA, Cisco Systems, ArcSight, LogLogic and EMC’s RSA security division. The integration allows organizations to send […]

DLP Technology Has Some Maturing to Do

After a year of consolidation in the data leak prevention market, DLP has emerged as a critical part of the IT security strategy for many organizations. But some say the technology still has plenty of room to grow. When it comes to DLP, organizations need to have a firm understanding of what their sensitive data […]

Security Research on Tap With New Track at RSA Conference

In less than two weeks, 17,000 people are expected to visit the Moscone Center in San Francisco for this year’s RSA Conference. Most will likely be blissfully unaware of the amount of work that goes into preparing an event attended by thousands of people. Sandra Toms LaPedis will not be one of them. Toms LaPedis […]