Search results for: software

nCipher Delivers Enhanced Security to Web Applications

Woburn, MA — 22 April, 2003–nCipher plc (LSE:NCH), a leading provider of cryptographic IT security solutions, today announced that its nForce hardware security module (HSM) is certified by IBM to integrate with the latest versions of IBM WebSphere* Application Server 5.0 and IBM Tivoli Access Manager* 4.1. This certification allows IBM customers to seamlessly integrate nCipher’s nForce product line with IBM-based IT infrastructures to secure and manage vital cryptographic keys to improve confidentiality, integrity and … More

Interview with Billy Barron, co-author of “Maximum Security 4/e”

Who is Billy Barron? Introduce yourself to our readers. I am a 15 year veteran of the computer industry. What’s unique about my background is that I’ve spent about half of my time as a system/network administrator and the other half as a developer. A good part of that development time has been working on security related products for the system administration market. I feel that my system administration experience gives me a unique view … More

Centrally Managed Network Security: Hope or Reality?

Ask any IT professional to predict the future of computer networking and you will get different answers. Guessing the future of technology has always been a dicey business at best. Planning ahead for the next set of security threats and building security solutions that are not vulnerable to these threats is even more difficult, because building network technology is, on the face of it a purposeful design process, whereas security threats are typically exploitations of … More

Security in Computing 3/e

This senior/graduate level textbook will give you a good foundation in computer security. The targeted audiences of this book are computer scientists, college students, software engineers and managers that want to broader their knowledge. The book is very well written, packed with a ton of information and clear to understand. More

Core Security Announces IMPACT 3.0 Penetration Testing Framework

Strategic security solutions developer Core Security Technologies, announced CORE IMPACT 3.0 – the new release of their penetration testing framework. Designed to replace expensive, time-consuming manual penetration testing with the state of the art automated penetration testing, CORE IMPACT enables real-world attacks on IT assets and presents analysis of information security risks in one comprehensive application. Key new features in CORE IMPACT 3.0 include:Macro-building capability. Penetration testers can now build macros that sequence modules, and … More

Funk Software Announced Odyssey Secure 802.11 Client for Pocket PC

Wireless LAN security solutions provider Funk Software, recently announced Odyssey Client for Pocket PC. This new version of their 802.1x access client, gives the handheld users a possibility to connect to the wireless links in a secure manner. Odyssey Client for Pocket PC is based on the IEEE security standard 802.1x, and supports strong WLAN security protocols, including EAP-TTLS. Joe Ryan, vice president of Funk Software noted: “Windows-based handhelds are increasingly essential in today’s enterprises, … More

Online Credit and Debit Card Security Report

Independent market analyst Datamonitor, released a new report focused on the situation of online credit and debit card security. E-Commerce payment volumes will continue to increase in coming years, and the analysts predict those surpassing 200 billion Euros by 2007. With this rise, we will see a coincident rise in online card fraud. The report covers the past, present and future of the card scheme security initiatives. The following couple of paragraphs explain the situation … More

Grampian Police to Use Biometric Facial Recognition to Identify Suspects in Seconds

Steria, a leading European IT services provider, has been chosen by the Grampian Police Force in Scotland, to provide a biometric facial recognition system that will dramatically enhance the investigative capabilities of the force. Steria will work with its biometric partner, Imagis Inc., to integrate Imagis’ ID-2000 face recognition technology to confirm the identities of suspects by cross-checking against photographic records. This is the same technology that was used to protect world leaders, including US … More

nCipher hardware selected to support newly announced VeriSign Trust Gateway Solution for Secure Web Services

RSA Conference, San Francisco, CA – 14 April 2003 – nCipher plc (LSE:NCH), a leading provider of IT cryptographic security solutions, today announced that its hardware security modules (HSMs) have been selected by VeriSign, Inc. (Nasdaq:VRSN), the leading provider of digital trust services, to provide enhanced security and management of cryptographic keys, as well as SSL-acceleration capabilities, for the new VeriSign Trust Gateway, a new Web services security solution announced today. The VeriSign Trust Gateway … More

nCipher Delivers End-To-End Encryption to Protect Sensitive PIN and Password Data

Cambridge, UK – 14 April 2003 – nCipher plc (LSE:NCH), a leading provider of IT cryptographic security, today announced the launch of CodeSafe SSLâ„? to bridge the security gap that exists between internal corporate applications and the Internet, keeping sensitive information safe as it crosses the DMZ. CodeSafe SSL allows, for the first time, the direct termination of an SSL connection to be made entirely within a trusted hardware device where it can be securely … More

Adobe Strengthens Electronic Document Security With Adobe Acrobat 6.0

~ enterprise security technology in Acrobat 6.0 highlighted at RSA conference in San Francisco ~ Adobe Systems, the leader in network publishing, is advancing security for electronic documents with its recent release of the Adobe Acrobat product family and Adobe Portable Document Format (PDF). With capabilities for digital signatures and document control, Acrobat 6.0 software and PDF will empower organisations to build document integration solutions for communicating business-critical information to broad audiences, with greater security … More

Linux Security: Kinds of Encryption

This is an excerpt from “A Practical Guide to Red Hat Linux 8“. An interview with the author is available here. Security Security is a major part of the foundation of any system that is not totally cut off from other machines and users. Some aspects of security have a place even on isolated machines. Examples are periodic system backups, BIOS or power-on passwords, and self-locking screensavers. A system that is connected to the outside … More