Brian Prince

PCI Compliance in the Cloud with Qualys

Qualys’ in-the-cloud strategy for helping businesses face compliance requirements took a new turn this week with QualysGuard PCI 2.0 and its new network scanning and reporting capabilities. With the new global scanning functionality, merchants can segment their network by business units and scan a select number of hosts at any given time or simultaneously, reducing […]

On-Demand Trend Touching the Database

Web-based databases are slowly gathering steam in the marketplace, taking the data querying needs of organizations straight into the cloud. The latest entry into this trend is Amazon.com, which announced Dec. 13 a limited beta for its SimpleDB service. However, others, such as Dabble DB and Trackvia, have also embraced an in-the-cloud model for databases. […]

Symantec Preps Norton 360 Beta

Symantec is prepping the launch of the beta version of the next Norton 360, and is arming it with a host of new features aimed at keeping users secure while allowing them to walk the tightrope between ease of use and granular control. The beta of Norton 360 Version 2.0 includes a number of changes […]

Closing a Hole in AV Software Testing

Behavioral-based detection has been a staple of anti-virus software for the past few years, but it remains absent from tests run by many labs rating the products. A group of security software providers and malware researchers are working to change that, but the question remains: Why has testing lagged so far behind the threat landscape? […]

Security Seal for A/V-Network Interoperability

OPSWAT is adding security certification to its resume with a new program aimed at verifying the interoperability of endpoint applications and network security products. Called the OESISOK Interoperability Certification Program, the initiative is meant as a seal of verification that the endpoint security tools you’ve deployed work with network infrastructure you have. A host of […]

Veracode Looks to Close ‘Backdoors’ in Code

Leave a backdoor in a program and it won’t be a draft coming in-it will be a hacker, who will be followed by his friends fraud and massive customer settlement. With this in mind, Veracode has expanded its on-demand scanning services to include new technology for detecting backdoors in application code. The move extends Veracode’s […]

MySQL Releases Database Connector Beta

MySQL AB has released a beta of the latest version of its MySQL Connector/ODBC that features performance enhancements and Unicode support. MySQL Connector/ODBC 5.1, available for download, works with most versions of the open-source MySQL database used today, specifically MySQL versions 4.1, 5.0, 5.1 and 6.0. MySQL Connector/ODBC, sometimes called MyODBC, allows users to connect […]

Database Archiving Market Evolves with Exploding Data Needs

The database archiving market is set to change as the needs of users usher in an era of partnerships and a new emphasis on the technology by database vendors, industry watchers said. Currently, the database archiving market remains relatively tiny, with a small subset of players such as Solix, Neon and Applimation. But as HP’s […]

Tivoli ID Manager Update Backs IBM Security Strategy

IBM has launched a new version of its Tivoli Identity Manager with an eye toward easing deployment and delivering on its promise of end-to-end security. With Tivoli Identity Manager 5.0, IBM delivers a major addition to its identity management portfolio, which is an important element of its security strategy for 2008, IBM officials said. “One […]

Microsoft Clubs Counterfeiters

Microsoft is once again after resellers hawking counterfeit Microsoft goods worldwide. In the past several weeks, the software giant has filed 52 lawsuits against resellers who allegedly sold counterfeit Microsoft software on various online markets. Fifteen of the 52 lawsuits involved software traced to a Chinese counterfeiting syndicate, broken up earlier this year by Chinese […]