News - Article Archives - Page 437

Study Shows Attack Activity Increasing

January 31, 2002 |
A study by a security vendor points to some fairly frightening trends, especially for companies in the high-tech, financial services, media/entertainment and power and energy industries.
READ MORE

Is Bill Gates Sincere About Security?

January 25, 2002 |
Microsoft skeptics may doubt the sincerity of Bill Gates' "Trustworthy Computing" security initiative, but eSecurityPlanet editor Paul Desmond holds a more optimistic view.
READ MORE

Fidelica aims to lower the cost of biometrics

December 12, 2001 |
There's a new player in the biometrics market that claims it can dramatically reduce implementation costs while improving reliability, using technology that relies on pressure sensing.
READ MORE

Eternal Vigilance: The Price of Information Security

December 01, 2001 |
Since Sept. 11, companies have started to think, "If that could happen, what else should I be worried about?" That is exactly the right mentality for business continuity planning. Risk management 101 dictates that you ask: What are the risks? What is the likelihood that each will occur? What are the costs to protect myself? What are the repercussions if I don't?
READ MORE

Aventail enhances management, directory features of VPN service

November 19, 2001 |
Aventail Corp. has announced Version 2.0 of its Aventail.Net virtual private network service, adding new directory and user management features intended to ease VPN administration chores.
READ MORE

Tivoli enters market for automated provisioning tools

November 19, 2001 |
The nascent market for software that automates the provisioning of IT resources got a boost last week from a significant player: IBM's Tivoli unit.
READ MORE

How hacking has entered the age of mass production.

November 01, 2001 |
This article was excerpted from the Cutter Business Technology Council Opinion, Pandemic I: Malicious Disruption (the Halloween Scenario). For a complete copy of the piece, visit http://www.cutter.com/consortium/trends/offer.html.
READ MORE

A CEO's guide to network security in the new economy

November 01, 2001 |
Given the financial implications a network attack can have, failing to defend against serious network attack becomes a failure of fiduciary responsibility. The CEO, as the chief trust officer, must therefore be actively involved in securing the company's network.
READ MORE

Lessons learned from SET - Visa takes another stab at PKI

October 30, 2001 |
When you've been involved in public key infrastructure (PKI) technology as long as Tom Manessis has, you learn a few things - mostly the hard way. Like how PKI by itself won't solve any business problem, and how it's important to keep things simple if you expect PKI efforts to gain traction.
READ MORE

SecurityFocus service warns of imminent attacks

October 30, 2001 |
Wouldn't it be nice to know a few days or even a week ahead of time when a potentially devastating virus such as Code Red was about to start spreading across the Internet? SecurityFocus claims it can do just that.
READ MORE

Cs3 mounts defense against DDoS attacks

October 30, 2001 |
One of today's more vexing security challenges is how to defend against a distributed denial of service attack (DDoS), where hackers install "zombie" code on hundreds or thousands of Internet-attached computers and use them to flood a single Web site with bogus requests. Cs3, Inc., which has been working on the problem since 1999, has come out with a product intended to stop such attacks from their point of origin - the "zombie" computers.
READ MORE

Global content security player establishes U.S. beachhead

October 17, 2001 |
Marshal Software has announced its entry into the U.S. market for content security with the opening of a headquarters in Atlanta and an upgrade offer for users of its key competitor's product.
READ MORE

Sanctum beefs up application vulnerability scanner

October 17, 2001 |
Sanctum, Inc. has released a new version of its AppScan Web application vulnerability scanning tool that it says offers improved performance, new customization features and greater accuracy than previous versions.
READ MORE

Recourse traps and hunts down cyber attackers

October 03, 2001 |
Recourse Technologies Inc., a provider of e-security threat management solutions, has announced ManHunt 1.2 and ManTrap 2.1 security solutions, designed to track and trap network intruders.
READ MORE

Hercules to help patch system vulnerabilities

October 03, 2001 |
In the wake of the recent Nimda virus, which followed closely on the heels of this summer's Code Red outbreak, you are no doubt tired of hearing that you need to be zealous about applying patches for known vulnerabilities to your various systems. You know it's important to keep up with these patches, but you can't exactly stop everything else you're doing.
READ MORE

Finding your role after September 11

October 01, 2001 |
In the wake of the tragedy of September 11, a lot of us have been left wondering what we can do to help.
READ MORE

Thor Technologies rebounds from September 11

October 01, 2001 |
Rebuilding IT systems, locating permanent office space and getting back to business as usual have been the main priorities of security software provider Thor Technologies over the last few weeks. Formerly based on the 87th floor of Tower One at the World Trade Center, Thor Technologies was one of the companies lucky enough to survive the September 11 attack with all of its 42 employees accounted for.
READ MORE

Putting the infrastructure back in PKI

October 01, 2001 |
Depending on who's talking - and what they stand to gain - you hear the full range of opinions regarding the readiness, ease of deployment, and most importantly, cost, of public key infrastructure (PKI) technology. Back in early 2000, a research firm was predicting the PKI market would be taking in multiple billions of dollars by the early to middle part of this decade. Everyone wanted a piece of the action, since capturing even 0.5% of that pie meant a lot of annual revenue. And with Y2K concerns out of the way, what else was there for IT managers to spend money on?
READ MORE

Risk dictates strength of corporate security

October 01, 2001 |
Network professionals face the perennial job of deciding what type of authentication to have corporate employees and trading partners use for access to corporate resources. Many view passwords as the least secure type of authentication, but find the cost of using better authentication methods, such as handheld tokens or digital certificates, still too high for general use.
READ MORE

President Bush's Focus on Security

October 01, 2001 |
META Group sees President Bush's appointment of a presidential advisor for cyberspace security as a positive move, as it sends a message that computer security is a national priority. This alone should encourage a greater awareness of the needs for computer security, making people more willing to make the extra effort and pay the extra expense to ensure their security. This should continue to drive investment in the security sector and be a positive for the leading security vendors, including Check Point, ISS, Network Associates, RSA, Symantec and VeriSign.
READ MORE