HomeCybersecurity

Cybersecurity

When Microsoft-Lovers Bash Microsoft

People tell me I bash Microsoft too much; that Microsofts products really are great. OK, so I wont bash Microsoft this time around. Ill let...

Geeks in Shorts Train the Night Away

Michelle was hanging out by the hot tub. Claire was digging the big wet mammals. And oh, those penetration specialists. What do they do for fun?...

Microsoft to Reissue Problem Patch to Fix Lockup Glitches

For some Windows users, there will be two Patch Tuesdays in April. The Redmond, Wash. software maker plans to rerelease the problematic MS06-015 update on...

Is E-Mail Authentication Back on the Radar?

Just when Im done dismissing the potential for e-mail authentication to become an effective standard, evidence is presented to the contrary.The E-mail Authentication Summit...

MessageOne Services Promise BlackBerry Security

As enterprise customers become increasingly dependent on widespread e-mail communication, anxiety levels regarding e-mail security are skyrocketing. In recognition, MessageOne has rolled out a set...

Is Security Consolidation Coming?

Increased demand for security suites and too many anti-virus vendors could create a good brew for consolidation, said industry watchers. While industry giant Symantec continues...

Cisco, Apple Patch Security Glitches

Cisco Systems and Apple Computer each released new security patches meant to plug vulnerabilities discovered in their respective products. The networking giant issued patches for...

Novell Aims for Diversity with e-Security Buyout

Novell bought security event management vendor e-Security April 19 in a $72 million cash deal. E-Security, based in Vienna, Va., is best known for...

BigFix Broadens Appeal of Patch Management Suite

BigFix will continue the drumbeat of convergence for administrative and security management functions on April 24 when it releases the latest release of its...

Microsoft Patches: When Silence Isnt Golden

Microsoft has fessed up to hiding details on software vulnerabilities that are discovered internally, insisting that full disclosure of every security-related product change only...