dcsimg

Paul Desmond - Article Archives - Page 9

Visa is monitoring merchants for security compliance

June 1, 2001
May 1, 2001 marked an important deadline for any merchant that accepts the Visa card for online transactions. On that date, Visa U.S.A. said it would begin mandating compliance with its Cardholder Information Security Program (CISP).
READ MORE

Your security plan may not be complete if you haven't protected your applications.

June 1, 2001
You've got antivirus software and firewalls in place and update them regularly. You use encryption for sensitive transactions and have a strong authentication mechanism. You even have an intrusion-detection system in place to alert you to suspicious activity. You figure all this amounts to reasonable protection against fraudulent transactions and any kind of Web site defacement.
READ MORE

Check Point preps its VPN for enterprise duty

May 23, 2001
Check Point Software Technologies this week announced a new release of its VPN-1/FireWall-1 software that is intended to increase the reliability, scalability, ease-of-use and performance of Check Point-based virtual private networks.
READ MORE

META Group analyst scopes out Web authorization tool market

May 23, 2001
The market for Web application authorization products, also known as single sign-on tools, is robust, but implementing the tools remains a chore that won't be painless.
READ MORE

RSA Conference reporter's notebook: Mining evidence of a maturing industry

May 23, 2001
The RSA Conference began 10 years ago as a meeting ground for cryptographers. Anyone not able to speak the language of crypto algorithms wouldn't bother showing up. This year's edition, held recently in San Francisco, showed a number of signs of an industry that is maturing.
READ MORE

Virus inoculation: How ISPs can ease the virus burden

May 23, 2001
In a little-noticed event this past January, a 16-year old computer hacker styling himself "Mafia Boy" pleaded guilty to 56 charges related to attacks last year on some of the Internet's largest e-commerce sites, such as Amazon.com, Yahoo! and eBay. The FBI estimates his acts of cyber vandalism caused more than $1.7 billion in damage by slowing or denying access to the Web sites for over six hours. Because of his status as a juvenile, Mafia Boy faces a penalty of two years in detention and a $650 fine. He boasted that he will commit this kind of cyber vandalism again.
READ MORE

Calculating PKI TCO

May 9, 2001
If you're thinking of undertaking a public key infrastructure (PKI) project, you may want to first make sure you know your way around a spreadsheet.
READ MORE

When and How to Use Security Consultants

May 9, 2001
More and more enterprises are turning to consultants to help out with security projects, often with mixed results. At the recent RSA Conference 2001 in San Francisco, a consultant who has been involved in successful projects as well as some less-than-successful engagements provided tips on how to avoid the pitfalls.
READ MORE

Conducting an IT asset inventory and risk analysis

April 16, 2001
When coming up with a security plan, it's crucial to take an inventory of your information assets and ensure you are protecting each one according to its net worth. While that may sound simple, it's actually a complex process that should involve managers from throughout your organization.
READ MORE

DOJ official makes the case for reporting cybercrime

April 16, 2001
If industry is going to solve the problem of computer crime and put a stop to web site defacements and other security breaches, it will require a cooperative effort with law enforcement. And it's time that organizations of all types lose the notion that there is a stigma attached to reporting computing crime.
READ MORE

Good security requires good relations with senior management

April 16, 2001
Not all data in your organization is the same and therefore you must treat it with different levels of security. Similarly, different people in your organization and among your business partners must be treated with varying levels of trust and security that match their roles. And hashing through all of this will require working closely with senior management, so you have to foster a comfortable working relationship with your executive team.
READ MORE

Camelot automates policy development

March 5, 2001
Most any security expert will agree that policies are a crucial part of your security plan. At the most basic level, you need policies that define who is allowed to access what resources and at what times.
READ MORE

NETSEC makes the switch to managed security services

March 5, 2001
Add NETSEC to your list of options for security service providers.
READ MORE

NIKSUN offers a security camera for your network

March 5, 2001
Even a solid security infrastructure can sometimes be compromised, at which point it takes a security forensics effort to get to the bottom of a break-in. But that forensics effort will be only as good as the data experts have available to mine. The more skilled the intruder is at covering his tracks, the less chance he will leave behind valuable clues and ultimately be caught.
READ MORE

PKI primer: the technology and the promise

March 5, 2001
Some security experts tout Public Key Infrastructure as the key enabling technology for E-commerce, the security safety net that will enable the buying and selling of goods online with the assurance that each party is who they say they are, that transactions will be completed as expected and that goods and services will be paid for.
READ MORE

Online retailers face privacy concerns on one hand while battling fraud with the other.

November 1, 2000
Security concerns with respect to business-to-consumer E-commerce come down to two issues: privacy and fraud.
READ MORE