Matt Hines

Novell Integrates Security Event Management

Novell has introduced its first update to the security event management products gained via its recent acquisition of e-Security, touting new compliance monitoring and reporting capabilities in the package. In addition to expanding security event tracking functions, Novell said it has also integrated the technology with all of its software platforms, including its SUSE Linux […]

Symantec Report IDs Holes in Vista Kernel Security

Anti-virus market leader Symantec has published its third and final report in a series of studies meant to examine the security improvements being made by Microsoft in early versions of its Vista operating system; while lauding the software makers efforts to lock down the kernel of the next-generation Windows OS, the security company did find […]

Microsoft Fixes a Dozen Security Flaws, Nine Critical

Microsoft released a dozen security bulletins on Aug. 8 in an effort to patch a variety of security issues affecting Windows and Office, including nine critical vulnerabilities present in popular applications such as Internet Explorer, Outlook Express and PowerPoint. Ten of the dozen security bulletins addressed issued by the Redmond, Wash.-based software maker include patches […]

Researchers Warn of Serious BlackBerry Vulnerability

Businesses that use gateway security appliances to protect Research In Motions BlackBerry communications servers could be subject to attacks based on the planned release of exploit code by a high-profile malware researcher. According to a warning released by network security applications and device provider Secure Computing, organizations with their BlackBerry servers installed behind their gateway […]

EMC Launches Enterprise DRM Tools

Storage giant EMC is jumping into the market for enterprise digital rights management software by introducing a pair of products that promise to place data security more squarely at the center of its information lifecycle management vision. Utilizing technology gained via the companys March 2006 acquisition of Authentica, EMC launched Documentum Information Rights Management—or IRM—Services […]

Experts: Response Speed Is Key

Its the call that no it manager wants to receive: An employees laptop computer has been stolen, and it may contain sensitive data. As a spate of recent incidents makes clear, laptop computer thefts and related data exposure is a serious issue, with organizations ranging from the U.S. Navy to financial services company Fidelity Investments […]

Preparation Eases Pain of Stolen Laptops

Before the end of the current session, the U.S. House of Representatives is expected to vote on the passage of the Financial Data Protection Act of 2005, which aims for more stringent reporting requirements for businesses that lose or mishandle sensitive customer data. The bill, if passed, is likely to force companies to be more […]

McAfee Revamps Security Risk Management Tools

McAfee expanded its array of compliance automation applications on Aug. 7, launching two new software offerings that promise to help companies test and report on their ability to fall in line with federal data security regulations. By adding McAfee Foundstone Enterprise 5.0 and McAfee Preventsys Compliance Auditor and Risk Analyzer have been added to its […]

Microsoft Sways Black Hatters with Vista Security Pledge

LAS VEGAS—When Microsoft launched its Trustworthy Computing initiative in 2002, many industry watchers doubted the seriousness of the software giants pledge to improve the security of its products. As the company prepares to release its Vista operating system in 2007, attendees of the Black Hat security conference said that theyre now convinced the company has […]

Experts Point to Weaknesses in NAC Security

LAS VEGAS—While Network Admission Control technologies are being heralded as a major step forward in helping to secure corporate IT infrastructures, security researchers contend that the tools remain open to a range of threats. At the Black Hat Briefings security conference being held here July 31 through Aug. 3, experts identified a slew of potential […]