News - Article Archives - Page 438

Siding with the judges on privacy issues

August 01, 2001 |
Federal judges are showing some proper perspective when it comes to matters of security and privacy, even when it means putting good guys in their place.
READ MORE

PKI policy in the business environment

August 01, 2001 |
In the traditional world, the individual moves through differing process and policy environments in which varying policies govern their interactions with others. As one example, governments face the problem of enabling and managing cross-border travel and immigration. To address such requirements, government law and/or policy typically require citizens crossing national boundaries to possess passports that establish citizenship and identity. A passport links or "binds" some information about the individual (photograph, height, weight, age) to a specially designed physical document having a unique issuing authority and control number.
READ MORE

Exploring the state of enterprise security management

August 01, 2001 |
Investments in enterprise security management (ESM) tools have been on the rise in the last few years due to an increasing awareness by organizations that they need to better leverage the investments they've made in a variety of information security point products. How are those products working? How do you know if your company is being attacked? How can volumes of log files be monitored in real time so that an attack can be met with a proactive response?
READ MORE

Security Strategies: Four Disciplines of Security Management

August 01, 2001 |
What it takes to be "secure" is for some the source of much confusion. The short answer is: you can never be "secure," only "secure enough." The long answer involves a discussion about risk aversion, networked environments, business expectations, and a host of other factors that create an enterprise security profile.
READ MORE

Presbyterian Healthcare creates opportunity out of new privacy regs

August 01, 2001 |
Health care providers are facing massive IT challenges these days, many driven by the changing legal landscape. The most pressing is the Health Insurance Portability and Accountability Act (HIPAA), which lays out strict rules for protecting the privacy of patient data. Congress is also wrangling over consumer rights legislation, such as a patient bill of rights that will likely affect not only how health care organizations treat patients, but also how those organizations treat patient data.
READ MORE

Help take a bite out of computer crime

August 01, 2001 |
As I was reading a story in the Boston Globe recently about a New Hampshire guy who is being sent to jail for hacking into his ex-employer's network, it struck me that I've been seeing more and more of these types of stories recently, with all manner of computer criminals being arrested, prosecuted and/or convicted, both in the United States and abroad.
READ MORE

NetIQ offers up central security console

July 18, 2001 |
Get involved in enough mergers and acquisitions and you just might find yourself adding a new line of business.
READ MORE

Disappearing Inc. changes name, adds focus on enterprise

July 18, 2001 |
Disappearing, Inc. has been making old emails disappear since last fall. Now it has made the name Disappearing, Inc. disappear as well.
READ MORE

Network-1 upgrades CyberwallPLUS

July 18, 2001 |
Network-1 Security Solutions has released a new version of its CyberwallPLUS host-based firewall and intrusion detection software. The new version is compatible with more desktop operating systems, and supports dial-up devices as well as wireless LANs. It also now supports load balancing and other features aimed at redundancy.
READ MORE

GROUP Software delivers security for Exchange

July 18, 2001 |
GROUP Software recently announced a Microsoft Exchange 2000 version of its email security software suite, which offers capabilities ranging from content filtering to virus protection.
READ MORE

Technology primer: Virtual private networks

July 01, 2001 |
Almost no other technology today generates the demand, enthusiasm and interest level as virtual private networks (VPNs). As evidence, Infonetics Research indicated 57%, 55% and 51% of large, medium and small businesses, respectively, plan to deploy VPNs by 2002. To find out why, we will take a look at the technology and some of the costs, benefits, advances and limitations associated with it.
READ MORE

Slaying Cerberus: Free your security staff from a hellish existence

July 01, 2001 |
New Yorkers have a saying: "Tell it like it is." As one security manager writing for other security managers out there, that is what I intend to do. It has been my experience that virtually every security organization-regardless of the vertical market in which it is located-suffers from three pressures inherent in the job.
READ MORE

Start-ups go on attack vs. denial-of-service threat

July 01, 2001 |
Four start-ups with their roots in university research are separately concentrating on combating denial-of-service network attacks, a huge threat to e-commerce and a daunting technical challenge because it is so difficult to distinguish "good" network traffic from the "bad" traffic that can cripple servers.
READ MORE

Primer: Developing a site security policy

July 01, 2001 |
The first rule of network site security is easily stated: that which is not expressly permitted is prohibited. A security policy should deny access to all network resources and then add back access on a specific basis. Implemented in this way, a site security policy will not allow any inadvertent actions or procedures.
READ MORE

Certicom delivers encryption for Palm devices

June 15, 2001 |
Certicom Corp. has announced movianCrypt, software that encrypts all data on handheld devices that use the Palm OS, to protect valuable corporate information in the event the device is lost or stolen.
READ MORE

CyberSource offers tips for protecting sensitive data

June 15, 2001 |
CyberSource Corp., a provider of risk management and real-time payment systems for businesses that specializes in fraud detection, has released a list of 10 tips to help e-businesses secure private consumer information and credit card data.
READ MORE

News analysis: Mixed results from E-Security show survey

June 15, 2001 |
The results are in from a survey of attendees at the recent E-Security Conference and Expo in Boston, and they indicate more than anything the need to conduct more such shows in the future.
READ MORE

F-Secure offers encryption and anti-virus for handhelds

June 15, 2001 |
F-Secure Corp. is in the midst of a software rollout that by September will bring anti-virus and encryption capabilities to three popular handheld operating systems: Palm OS, Pocket PC and the Symbian OS.
READ MORE

Double your pleasure, double your fun

June 01, 2001 |
Double down all you who uttered "security is an enabler" with a straight face, it's time to see if you were bluffing. Do it now, for we are the lucky ones - we win with Web services not once but twice. Not only can we make use of a Web services infrastructure to further security, but we are the critical piece of that Web services infrastructure. Say it with me, "There is no way Web services can deploy successfully without enhanced security."
READ MORE

META Group assesses the automated security administration market

June 01, 2001 |
Pressure to demonstrate information security value will increase users' focus on metrics and highlight the need for unified security administration over the next year, according to the META Group. This, in turn, will spur further integration among activities surrounding threat management, intrusion detection, policy audits, vulnerability assessments, and forensic tests.
READ MORE