Victor R. Garza

Contributing Editor

Victor R. 'Bob' Garza has been writing about technology for more than 25 years. Currently he serves as a Lecturer at the Naval Postgraduate School and conducts research on new technology for the military.

Bossie Awards 2017: The best networking and security software

Bossie Awards 2016: The best open source networking and security software

Bossie Awards 2016: The best open source networking and security software

InfoWorld's top picks among open source tools for connecting devices and securing those devices and connections

Product review: Core Impact penetration tester goes phishing

With Version 7.5, the tried-and-true attack toolkit becomes easier to use, leverages the fallibility of users to gain access to host systems, and adds security checks for Web-based databases

Agiliance weaves together governance, compliance, and security management

IT governance involves measuring risk, taking appropriate security measures, and reassessing both risk and security at regular intervals. It's a difficult job made harder by the fact that these processes are typically managed...

Preview: McAfee's DLP product stops your host's data leaks

Data leak prevention (or protection) is all about making sure that data doesn't leave your organization without approval - a laudable goal. These days, I spend most of my time trying to convince people of the simple things they can do...

A Bluetooth speakerphone for your mobile

A little larger than the typical cell phone or PDA, the Spracht Aura Mobile BT conference phone is a versatile little unit. You can use the Aura as a Voice over IP (VoIP) conference speakerphone for Internet phone calls with a...

Top Layer Mitigator 5500 nails the IPS basics

Appliance focuses on core IPS, bolstered by firewall capabilities

Q1 hones in on network events

QRadar SEM has beautiful interface and reporting but lacks comprehensive data source support

Innovative IPSes resist our attacks

McAfee IntruShield and NFR Sentivist bring useful extras to intrusion prevention

Rethinking incident response

EnCase Enterprise 5 brings powerful investigative tools to bear on potential threats

Check Point and Sygate corral end points

Similarly strong network access control solutions make for a hard choice

New dimensions in intrusion defense

Sourcefire 3D combines network profiling and rule-based detection for policy enforcement

Load More