Sunday, April 11, 2021

Paul Desmond

Security Product of the Year — Norton AntiVirus Corporate Edition

Answer: Yaha, Klez, Lovegate, Bugbear and Backdoor. Question: What are five reasons Datamation readers selected Symantec AntiVirus Corporate Edition 7.6 as the 2002 security product...

Open Source: The New Security Problem Child?

Move over Microsoft, there's a new security punching bag in town: open source software. Security consultants at Aberdeen Group examined security advisories published by the Carnegie Mellon...

Flaw Found in Popular Unix, Linux GUI

The CERT Coordination Center (CERT/CC) this week issued an advisory regarding a buffer overflow vulnerability in the Common Desktop Environment (CDE), a graphical user interface employed in...

Security Flaw Found In Symantec Firewalls

A number of Symantec firewalls, including popular Raptor models, have a security flaw that renders networks protected by the systems vulnerable to intrusion. The flaw was...

IT Pros Wary Of Cyber Attack On U.S. Government

IT professionals are worried about the prospect of a cyber attack against the U.S. government, with many considering such an attack "likely" in the next year, according...

CERT Warns Of DHCP Threat

The CERT Coordination Center is warning of a vulnerability in Dynamic Host Configuration Protocol (DHCP) servers that could enable an intruder to gain root access to the...

Report Casts Pall On Security Industry (But Don’t Fret Yet)

"Network security's days in the limelight are over," according to a recent report from the ICA Syndicate, the publishing arm of the research and strategy firm Intellectual...

Free IBM Tool Helps Users Address Privacy Policies

IBM on Thursday announced a free tool intended to help companies define and implement privacy policies that address the handling of customer and internal data. The...

3Com To Deliver NIC-based Firewalls

3Com Corp. is making a push to extend security to server, desktop and, eventually, mobile computing devices with the announcement of the 3Com Embedded Firewall. The 3Com...

SNMP Vulnerability A ‘Triple Threat’

Vulnerabilities in the software used to manage the bulk of the routers, switches and other devices that comprise corporate networks and the Internet leave these systems open...

Latest Articles

The Conversational AI Revolution: The...

One of the things I’m looking forward to seeing at next week’s NVIDIA GTC event is an update on their Conversational AI efforts. I’m fascinated...

Edge Computing

Edge computing is a broad term that refers to a highly distributed computing framework that moves compute and storage resources closer to the exact...

Data-Driven Decision Making: Top 9...

The phrase data-driven decision making – certainly popular in the field of data analytics – may seem redundant. After all, nearly everything is driven...

Top Performing Artificial Intelligence Companies...

As artificial intelligence has become a growing force in business, today’s top AI companies are leaders in this emerging technology. Often leveraging cloud computing and...