News - Article Archives - Page 440

Check Point preps its VPN for enterprise duty

May 23, 2001 |
Check Point Software Technologies this week announced a new release of its VPN-1/FireWall-1 software that is intended to increase the reliability, scalability, ease-of-use and performance of Check Point-based virtual private networks.
READ MORE

RSA Conference reporter's notebook: Mining evidence of a maturing industry

May 23, 2001 |
The RSA Conference began 10 years ago as a meeting ground for cryptographers. Anyone not able to speak the language of crypto algorithms wouldn't bother showing up. This year's edition, held recently in San Francisco, showed a number of signs of an industry that is maturing.
READ MORE

META Group analyst scopes out Web authorization tool market

May 23, 2001 |
The market for Web application authorization products, also known as single sign-on tools, is robust, but implementing the tools remains a chore that won't be painless.
READ MORE

META Group says security suites don't work

May 23, 2001 |
META Group research indicates failure among vendors attempting to create comprehensive security integration schemes. While most users desire a single security vendor, in META Group's opinion, it is becoming apparent this is unlikely to occur. Instead, META Group expects most security vendors to focus more narrowly on tactical products to generate revenue.
READ MORE

Retailers wary of privacy legislation out of Washington

May 23, 2001 |
Retailers are concerned with the impact of potential privacy legislation out of Washington, D.C., but they don't know what exactly to be afraid of since a number of scenarios could unfold based on activity in Congress, Cathy Hotka, VP of IT at the National Retail Federation (NRF) told an audience at the Brainstorm Group's E-Business Integration Conference Series recently in Chicago.
READ MORE

Virus inoculation: How ISPs can ease the virus burden

May 23, 2001 |
In a little-noticed event this past January, a 16-year old computer hacker styling himself "Mafia Boy" pleaded guilty to 56 charges related to attacks last year on some of the Internet's largest e-commerce sites, such as Amazon.com, Yahoo! and eBay. The FBI estimates his acts of cyber vandalism caused more than $1.7 billion in damage by slowing or denying access to the Web sites for over six hours. Because of his status as a juvenile, Mafia Boy faces a penalty of two years in detention and a $650 fine. He boasted that he will commit this kind of cyber vandalism again.
READ MORE

Tucker Anthony Sutro's quarterly security market update

May 23, 2001 |
In their quarterly report on the health of the information security market, Frederick D. Ziegel and John D. Hall of Tucker Anthony Sutro report that the info security industry has shown resilience among information technology buyers while almost all other information technology spending growth has fallen into an abyss.
READ MORE

Examining the applications that can deliver ROI for PKI

May 09, 2001 |
Buckling under the pressure of a waning U.S. macro environment, current and prospective capital and information technology spending budgets are under intense scrutiny. As a result, projects now face higher hurdle rates as a common management edict returns to the forefront: expenditures must demonstrate tangible returns on investments. With this sentiment in mind, we thought it prudent to examine one of the most talked-about technologies in the information security space and take a look at how returns on investments can be generated by public key infrastructure (PKI).
READ MORE

Calculating PKI TCO

May 09, 2001 |
If you're thinking of undertaking a public key infrastructure (PKI) project, you may want to first make sure you know your way around a spreadsheet.
READ MORE

Designing an E-commerce Security Architecture

May 09, 2001 |
Designing an E-commerce Security Architecture
READ MORE

When and How to Use Security Consultants

May 09, 2001 |
More and more enterprises are turning to consultants to help out with security projects, often with mixed results. At the recent RSA Conference 2001 in San Francisco, a consultant who has been involved in successful projects as well as some less-than-successful engagements provided tips on how to avoid the pitfalls.
READ MORE

Managed security services garner increased interest

May 09, 2001 |
Most companies are spending about 1% of their IT budgets on security when they should be spending in the 3% to 5% range, said Earl Perkins, senior program director with the META Group's Security Infusion team based in New Orleans.
READ MORE

Honeynet Project highlights the real cost of poor security

May 09, 2001 |
Those of you who run your corporation's networks are probably aware of the term honeypot, a computer that is designed from the start to be compromised and attacked. The idea is that an ordinary off-the-shelf server, typically without any particular security patches or other modifications, is placed out on the Internet, and several packet monitoring tools are setup to watch what happens. The idea is to use the honeypot to learn the tools and tactics used by the bad guys (which for the purposes of this essay we'll call black hats).
READ MORE

King Content Launches SecurityGram Electronic News Bulletin

April 16, 2001 |
King Content Launches SecurityGram Electronic News Bulletin
READ MORE

Conducting an IT asset inventory and risk analysis

April 16, 2001 |
When coming up with a security plan, it's crucial to take an inventory of your information assets and ensure you are protecting each one according to its net worth. While that may sound simple, it's actually a complex process that should involve managers from throughout your organization.
READ MORE

Good security requires good relations with senior management

April 16, 2001 |
Not all data in your organization is the same and therefore you must treat it with different levels of security. Similarly, different people in your organization and among your business partners must be treated with varying levels of trust and security that match their roles. And hashing through all of this will require working closely with senior management, so you have to foster a comfortable working relationship with your executive team.
READ MORE

DOJ official makes the case for reporting cybercrime

April 16, 2001 |
If industry is going to solve the problem of computer crime and put a stop to web site defacements and other security breaches, it will require a cooperative effort with law enforcement. And it's time that organizations of all types lose the notion that there is a stigma attached to reporting computing crime.
READ MORE

Marriott's e-security strategy:A business-IT collaboration

April 16, 2001 |
In the experience of Marriott International, Inc.'s Chris Zoladz, e-business security is a process, not a project.
READ MORE

ecomSecurity.com

April 16, 2001 |
Investor's Corner
READ MORE

TIBCO taps ValiCert to secure online transactions

April 16, 2001 |
To bring advanced security to its customers as they conduct transactions online, TIBCO has formed an alliance with ValiCert, a provider of products and services for securing transactions and documents based in Mountain View, Calif.
READ MORE