X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 security advisories


Anti-Virus Advisories: Rating Them
The recent ILOVEYOU worm, was the most widely spread virus or worm reported as of yet. With so many anti-virus vendors to choose from, which one should you

security advisories  breeding ground for new security technologists including anti-virus applications. Advisory Challengers CA, NAI, Proland, Sophos, Sybari, and Trend Micro anti-virus products are all credible and respectable products, and with not that much work, their advisories can all be improved. The Network Associates site was incredibly slow, and it wasn't clear what the difference was between the McAfee antivirus tool and Dr. Solomon's. The same advisory was issued for each product. If there is no difference in how

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » security advisories

Ernst & Young Leads Big 5 in Security


Announcing an upgrade to its online security portal, Ernst & Young, takes the lead in big 5 security services.

security advisories   Read More

6 Days After Advisory Posted, AboveNet Gets Hit


Once a security advisory gets posted, vendors need to work quickly to rectify the problem. Security engineers are not the only ones reading the advisories. There are cybercriminals who wait for advisories to come out, and take advantage of woe-be-gone networks that have not yet been patched.

security advisories   Read More

Outsourcing Security Part 3: Selecting a Managed Security Services Provider


As the final article in a three-part series on outsourcing security, the following article provides guidelines for selecting a dependable managed security services provider.

security advisories   Read More

New Facts on Web Security and Online transactions


Get the new facts on Web security and what you can do keep your business thriving in Choosing the Right Security Solution: Moving beyond SSL to Est...

security advisories   Read More

Spire Security


Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics.

security advisories   Read More

Top 5 Mobile Security Threats


While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of malicious code. What’s worse is that 50 percent of employees currently use their mobile devices at work. Early recognition of mobile security threats is a company’s best line of defense. Here are today’s top 5 mobile security threats and how to stop them in their tracks.

security advisories   Read More

Bootcamp for the Pros; Why Ernst & Young Will Lead Security Auditing Standards


Original News & Educational Review Course Summary Ernst & Young, has put together the quintessential course for security engineers looking to improve their ability to protect their organization's website, systems, and network. Dubbed eXtreme Hacking, and carrying a price tag of $5,000 a slot, this course is for anyone but hacks. With an impressive course book that fills a two-inch thick binder, leading Ernst & Young security engineers take you step-by-step through all the ways that bad guys try to subvert your mission critical servers and network configurations. Using dual-bootable NT-Linux laptops, and an accompanying network setup for practicing subversive attacks and exploits, attendees will leave the course with an entire new bag of tools and tricks that help them understand how bad guys identify target IP addresses, collect information about the systems they plan on compromising, and exploit weaknesses without being noticed. The idea is to learn how to figure out what the weaknesses are in your organization's network before the bad guys do.

security advisories   Read More

Data Security Is Less Expensive than Your Next Liability Lawsuit: Best Practices in Application Data Security


Insecure data. Heavy fines due to non-compliance. Loss of customers and reputation. It adds up to a nightmare scenario that businesses want to avoid at all costs. However, this nightmare is preventable: knowledge base-driven data security solutions can be critical tools for enterprises wanting to secure not only their data—but also their status in the marketplace.

security advisories   Read More

Security and Trust: Doing More Business Over the internet


Learn how a secure web site can help you make sales in Security and Trust: Doing Business Over the Internet.

security advisories   Read More

Which is Best: Cloud-Based or on-Premise Web security?


As you'll discover in the Aberdeen report, Web Security in the Cloud: More Secure!

security advisories   Read More