News - Article Archives - Page 434

Virus inoculation: How ISPs can ease the virus burden

|
In a little-noticed event this past January, a 16-year old computer hacker styling himself "Mafia Boy" pleaded guilty to 56 charges related to attacks last year on some of the Internet's largest e-commerce sites, such as Amazon.com, Yahoo! and eBay. The FBI estimates his acts of cyber vandalism caused more than $1.7 billion in damage by slowing or denying access to the Web sites for over six hours. Because of his status as a juvenile, Mafia Boy faces a penalty of two years in detention and a $650 fine. He boasted that he will commit this kind of cyber vandalism again.
READ MORE

Tucker Anthony Sutro's quarterly security market update

|
In their quarterly report on the health of the information security market, Frederick D. Ziegel and John D. Hall of Tucker Anthony Sutro report that the info security industry has shown resilience among information technology buyers while almost all other information technology spending growth has fallen into an abyss.
READ MORE

Examining the applications that can deliver ROI for PKI

|
Buckling under the pressure of a waning U.S. macro environment, current and prospective capital and information technology spending budgets are under intense scrutiny. As a result, projects now face higher hurdle rates as a common management edict returns to the forefront: expenditures must demonstrate tangible returns on investments. With this sentiment in mind, we thought it prudent to examine one of the most talked-about technologies in the information security space and take a look at how returns on investments can be generated by public key infrastructure (PKI).
READ MORE

Calculating PKI TCO

|
If you're thinking of undertaking a public key infrastructure (PKI) project, you may want to first make sure you know your way around a spreadsheet.
READ MORE

Designing an E-commerce Security Architecture

|
Designing an E-commerce Security Architecture
READ MORE

When and How to Use Security Consultants

|
More and more enterprises are turning to consultants to help out with security projects, often with mixed results. At the recent RSA Conference 2001 in San Francisco, a consultant who has been involved in successful projects as well as some less-than-successful engagements provided tips on how to avoid the pitfalls.
READ MORE

Managed security services garner increased interest

|
Most companies are spending about 1% of their IT budgets on security when they should be spending in the 3% to 5% range, said Earl Perkins, senior program director with the META Group's Security Infusion team based in New Orleans.
READ MORE

Honeynet Project highlights the real cost of poor security

|
Those of you who run your corporation's networks are probably aware of the term honeypot, a computer that is designed from the start to be compromised and attacked. The idea is that an ordinary off-the-shelf server, typically without any particular security patches or other modifications, is placed out on the Internet, and several packet monitoring tools are setup to watch what happens. The idea is to use the honeypot to learn the tools and tactics used by the bad guys (which for the purposes of this essay we'll call black hats).
READ MORE

King Content Launches SecurityGram Electronic News Bulletin

|
King Content Launches SecurityGram Electronic News Bulletin
READ MORE

Conducting an IT asset inventory and risk analysis

|
When coming up with a security plan, it's crucial to take an inventory of your information assets and ensure you are protecting each one according to its net worth. While that may sound simple, it's actually a complex process that should involve managers from throughout your organization.
READ MORE

Good security requires good relations with senior management

|
Not all data in your organization is the same and therefore you must treat it with different levels of security. Similarly, different people in your organization and among your business partners must be treated with varying levels of trust and security that match their roles. And hashing through all of this will require working closely with senior management, so you have to foster a comfortable working relationship with your executive team.
READ MORE

DOJ official makes the case for reporting cybercrime

|
If industry is going to solve the problem of computer crime and put a stop to web site defacements and other security breaches, it will require a cooperative effort with law enforcement. And it's time that organizations of all types lose the notion that there is a stigma attached to reporting computing crime.
READ MORE

Marriott's e-security strategy:A business-IT collaboration

|
In the experience of Marriott International, Inc.'s Chris Zoladz, e-business security is a process, not a project.
READ MORE

ecomSecurity.com

|
Investor's Corner
READ MORE

TIBCO taps ValiCert to secure online transactions

|
To bring advanced security to its customers as they conduct transactions online, TIBCO has formed an alliance with ValiCert, a provider of products and services for securing transactions and documents based in Mountain View, Calif.
READ MORE

It takes more than firewalls and intrusion detection systems to protect your Web-based applications.

|
You've installed a firewall to protect the corporate jewels inside your network. Likewise, you've got intrusion detection software so you can find out when someone is pounding on your servers, trying to get in. So you shouldn't have to worry about anyone being able to tamper with your Web applications, right?
READ MORE

Camelot automates policy development

|
Most any security expert will agree that policies are a crucial part of your security plan. At the most basic level, you need policies that define who is allowed to access what resources and at what times.
READ MORE

NIKSUN offers a security camera for your network

|
Even a solid security infrastructure can sometimes be compromised, at which point it takes a security forensics effort to get to the bottom of a break-in. But that forensics effort will be only as good as the data experts have available to mine. The more skilled the intruder is at covering his tracks, the less chance he will leave behind valuable clues and ultimately be caught.
READ MORE

Securing Extranets

|
Securing Extranets
READ MORE

Better security - for free

|
The Center for Internet Security (CIS) has just released its second security "benchmark," a collection of best practices and security settings meant to ensure a "prudent level of minimum due care for operating system security."
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|