HomeCybersecurity

Cybersecurity

State Employs GPS to Track Sex Offenders

Massachusetts authorities last week began using GPS technology to track some of the states sex offenders.According to published reports, the Department of Probation plans...

Infosec Needs to Avoid Repeating Past Patterns of Error

If you look at the shape of a mountain range, its often difficult to tell whether the image spans just a few hundred feet...

Information Security Show Highlights New Threats, Old Problems

Pinched by tough, new data-privacy regulations on the one hand and aging Internet protocols on the other, IT security administrators said they are struggling...

eSafe 5 Targets Drive-By Spyware Sites

A new version of Aladdin Knowledge Systems Ltd.s eSafe gateway security software promises to protect users from a host of Internet ills, including so-called...

IBM Unveils Tivoli ID Manager

IBM last week announced its new IBM Tivoli Federated Identity Manager, which will extend the reach of Tivolis identity and access management technology, allowing...

Imperva, Kavado Firewalls Lock Down Web Applications

Companies looking to avoid the disgrace of losing confidential customer data via a compromise of publicly accessible Web applications should seriously consider deploying a...

SecureSphere 3.3 Protects Web Apps

Impervas SecureSphere 3.3 Dynamic Profiling Firewall, available since February, is a robust and flexible defensive solution for Web applications and databases alike.Click here to...

Defiance TMS Firewall Worthy of Enteprise Deployment

With Defiance TMS (Threat Management System), Kavado has expanded its Web application firewall platform for larger enterprises to manage and maintain multiple firewalls and...

How to Test Web App Firewalls

During tests of Web application firewalls, eWEEK Labs configured Imperva Inc.s and Kavado Inc.s products to protect versions of applications that internal staffers regularly...

Student Raises the Specter of an Attack on Intel Chips

Companies running servers based on certain Intel Corp. chips could come under attack from the inside, due to a new type of software timing...