News - Article Archives - Page 434

How to Choose the Right Enterprise Firewall

|
Shopping for an enterprise firewall can be a daunting task. However, with a little background knowledge, an understanding of firewall features, and knowing what questions to ask the vendors, you'll end up with just the right firewall for your organization.
READ MORE

SNMP Vulnerability A 'Triple Threat'

|
The vulnerabilities reported Tuesday in Simple Network Management Protocol, the ubiquitous software used to monitor and manage all sorts of networked devices, rate extremely high in the three variables used to measure the severity of a security flaw.
READ MORE

CEO Survey Underscores Security Disconnect

|
A recent Booz Allen survey finds far too many CEOs lack a "thorough understanding" of what it takes to develop and implement a rigorous security strategy.
READ MORE

House Approves $880 Million for Cyber Security

|
Growing concerns over terrorism targeting IT infrastructure prompts Cyber Security Research and Development Act.
READ MORE

GAO Slams Treasury for Insecure Computer Systems

|
The federal agency responsible for collecting and disbursing the majority of money that flows through the U.S. government is using computer systems that are highly insecure, according to a report by the General Accounting Office.
READ MORE

Researchers Expect Spike In Security Spending

|
While IT spending in general is soft, analysts say worldwide spending on IT security software could rise nearly 20% this year, with security services also expected to see increased demand.
READ MORE

When Users Jeopardize Network Security

|
Try as you might, you just can't stop users from opening virus-ridden e-mail attachments, or compromising security in other ways. What to do about it?
READ MORE

Cyota Accelerates Security of Internet Credit Card Payments

|
In response to increasing pressure by Visa and MasterCard to improve the security of online credit and debit card payments, Cyota Inc. is signing up major banks and acquirers across the country to its SecureSuite service.
READ MORE

There's a New Security Sheriff in Redmond

|
Microsoft follows up on Bill Gates' pledge to improve the security of the company's software by hiring a new chief security strategist.
READ MORE

Study Shows Attack Activity Increasing

|
A study by a security vendor points to some fairly frightening trends, especially for companies in the high-tech, financial services, media/entertainment and power and energy industries.
READ MORE

Is Bill Gates Sincere About Security?

|
Microsoft skeptics may doubt the sincerity of Bill Gates' "Trustworthy Computing" security initiative, but eSecurityPlanet editor Paul Desmond holds a more optimistic view.
READ MORE

Fidelica aims to lower the cost of biometrics

|
There's a new player in the biometrics market that claims it can dramatically reduce implementation costs while improving reliability, using technology that relies on pressure sensing.
READ MORE

Eternal Vigilance: The Price of Information Security

|
Since Sept. 11, companies have started to think, "If that could happen, what else should I be worried about?" That is exactly the right mentality for business continuity planning. Risk management 101 dictates that you ask: What are the risks? What is the likelihood that each will occur? What are the costs to protect myself? What are the repercussions if I don't?
READ MORE

Aventail enhances management, directory features of VPN service

|
Aventail Corp. has announced Version 2.0 of its Aventail.Net virtual private network service, adding new directory and user management features intended to ease VPN administration chores.
READ MORE

Tivoli enters market for automated provisioning tools

|
The nascent market for software that automates the provisioning of IT resources got a boost last week from a significant player: IBM's Tivoli unit.
READ MORE

How hacking has entered the age of mass production.

|
This article was excerpted from the Cutter Business Technology Council Opinion, Pandemic I: Malicious Disruption (the Halloween Scenario). For a complete copy of the piece, visit http://www.cutter.com/consortium/trends/offer.html.
READ MORE

A CEO's guide to network security in the new economy

|
Given the financial implications a network attack can have, failing to defend against serious network attack becomes a failure of fiduciary responsibility. The CEO, as the chief trust officer, must therefore be actively involved in securing the company's network.
READ MORE

Lessons learned from SET - Visa takes another stab at PKI

|
When you've been involved in public key infrastructure (PKI) technology as long as Tom Manessis has, you learn a few things - mostly the hard way. Like how PKI by itself won't solve any business problem, and how it's important to keep things simple if you expect PKI efforts to gain traction.
READ MORE

SecurityFocus service warns of imminent attacks

|
Wouldn't it be nice to know a few days or even a week ahead of time when a potentially devastating virus such as Code Red was about to start spreading across the Internet? SecurityFocus claims it can do just that.
READ MORE

Cs3 mounts defense against DDoS attacks

|
One of today's more vexing security challenges is how to defend against a distributed denial of service attack (DDoS), where hackers install "zombie" code on hundreds or thousands of Internet-attached computers and use them to flood a single Web site with bogus requests. Cs3, Inc., which has been working on the problem since 1999, has come out with a product intended to stop such attacks from their point of origin - the "zombie" computers.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|