×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

News - Article Archives - Page 440

META Group analyst scopes out Web authorization tool market

May 23, 2001 |
The market for Web application authorization products, also known as single sign-on tools, is robust, but implementing the tools remains a chore that won't be painless.
READ MORE

META Group says security suites don't work

May 23, 2001 |
META Group research indicates failure among vendors attempting to create comprehensive security integration schemes. While most users desire a single security vendor, in META Group's opinion, it is becoming apparent this is unlikely to occur. Instead, META Group expects most security vendors to focus more narrowly on tactical products to generate revenue.
READ MORE

Retailers wary of privacy legislation out of Washington

May 23, 2001 |
Retailers are concerned with the impact of potential privacy legislation out of Washington, D.C., but they don't know what exactly to be afraid of since a number of scenarios could unfold based on activity in Congress, Cathy Hotka, VP of IT at the National Retail Federation (NRF) told an audience at the Brainstorm Group's E-Business Integration Conference Series recently in Chicago.
READ MORE

Virus inoculation: How ISPs can ease the virus burden

May 23, 2001 |
In a little-noticed event this past January, a 16-year old computer hacker styling himself "Mafia Boy" pleaded guilty to 56 charges related to attacks last year on some of the Internet's largest e-commerce sites, such as Amazon.com, Yahoo! and eBay. The FBI estimates his acts of cyber vandalism caused more than $1.7 billion in damage by slowing or denying access to the Web sites for over six hours. Because of his status as a juvenile, Mafia Boy faces a penalty of two years in detention and a $650 fine. He boasted that he will commit this kind of cyber vandalism again.
READ MORE

Examining the applications that can deliver ROI for PKI

May 09, 2001 |
Buckling under the pressure of a waning U.S. macro environment, current and prospective capital and information technology spending budgets are under intense scrutiny. As a result, projects now face higher hurdle rates as a common management edict returns to the forefront: expenditures must demonstrate tangible returns on investments. With this sentiment in mind, we thought it prudent to examine one of the most talked-about technologies in the information security space and take a look at how returns on investments can be generated by public key infrastructure (PKI).
READ MORE

Calculating PKI TCO

May 09, 2001 |
If you're thinking of undertaking a public key infrastructure (PKI) project, you may want to first make sure you know your way around a spreadsheet.
READ MORE

Designing an E-commerce Security Architecture

May 09, 2001 |
Designing an E-commerce Security Architecture
READ MORE

When and How to Use Security Consultants

May 09, 2001 |
More and more enterprises are turning to consultants to help out with security projects, often with mixed results. At the recent RSA Conference 2001 in San Francisco, a consultant who has been involved in successful projects as well as some less-than-successful engagements provided tips on how to avoid the pitfalls.
READ MORE

Managed security services garner increased interest

May 09, 2001 |
Most companies are spending about 1% of their IT budgets on security when they should be spending in the 3% to 5% range, said Earl Perkins, senior program director with the META Group's Security Infusion team based in New Orleans.
READ MORE

Honeynet Project highlights the real cost of poor security

May 09, 2001 |
Those of you who run your corporation's networks are probably aware of the term honeypot, a computer that is designed from the start to be compromised and attacked. The idea is that an ordinary off-the-shelf server, typically without any particular security patches or other modifications, is placed out on the Internet, and several packet monitoring tools are setup to watch what happens. The idea is to use the honeypot to learn the tools and tactics used by the bad guys (which for the purposes of this essay we'll call black hats).
READ MORE

King Content Launches SecurityGram Electronic News Bulletin

April 16, 2001 |
King Content Launches SecurityGram Electronic News Bulletin
READ MORE

Conducting an IT asset inventory and risk analysis

April 16, 2001 |
When coming up with a security plan, it's crucial to take an inventory of your information assets and ensure you are protecting each one according to its net worth. While that may sound simple, it's actually a complex process that should involve managers from throughout your organization.
READ MORE

Good security requires good relations with senior management

April 16, 2001 |
Not all data in your organization is the same and therefore you must treat it with different levels of security. Similarly, different people in your organization and among your business partners must be treated with varying levels of trust and security that match their roles. And hashing through all of this will require working closely with senior management, so you have to foster a comfortable working relationship with your executive team.
READ MORE

DOJ official makes the case for reporting cybercrime

April 16, 2001 |
If industry is going to solve the problem of computer crime and put a stop to web site defacements and other security breaches, it will require a cooperative effort with law enforcement. And it's time that organizations of all types lose the notion that there is a stigma attached to reporting computing crime.
READ MORE

Marriott's e-security strategy:A business-IT collaboration

April 16, 2001 |
In the experience of Marriott International, Inc.'s Chris Zoladz, e-business security is a process, not a project.
READ MORE

ecomSecurity.com

April 16, 2001 |
Investor's Corner
READ MORE

TIBCO taps ValiCert to secure online transactions

April 16, 2001 |
To bring advanced security to its customers as they conduct transactions online, TIBCO has formed an alliance with ValiCert, a provider of products and services for securing transactions and documents based in Mountain View, Calif.
READ MORE

Camelot automates policy development

March 05, 2001 |
Most any security expert will agree that policies are a crucial part of your security plan. At the most basic level, you need policies that define who is allowed to access what resources and at what times.
READ MORE

A case study in security incident forensics and response.

March 05, 2001 |

Imagine if, at the very time you are in discussions with a security services company about beefing up your defenses, you find that your company has been compromised. But the intruder, rather than attacking your company's network, instead uses your servers as a launching pad for attacks on other companies, making your firm an unwitting accomplice.

READ MORE

NIKSUN offers a security camera for your network

March 05, 2001 |
Even a solid security infrastructure can sometimes be compromised, at which point it takes a security forensics effort to get to the bottom of a break-in. But that forensics effort will be only as good as the data experts have available to mine. The more skilled the intruder is at covering his tracks, the less chance he will leave behind valuable clues and ultimately be caught.
READ MORE