News - Article Archives - Page 441

A case study in security incident forensics and response.

March 05, 2001 |

Imagine if, at the very time you are in discussions with a security services company about beefing up your defenses, you find that your company has been compromised. But the intruder, rather than attacking your company's network, instead uses your servers as a launching pad for attacks on other companies, making your firm an unwitting accomplice.

READ MORE

NIKSUN offers a security camera for your network

March 05, 2001 |
Even a solid security infrastructure can sometimes be compromised, at which point it takes a security forensics effort to get to the bottom of a break-in. But that forensics effort will be only as good as the data experts have available to mine. The more skilled the intruder is at covering his tracks, the less chance he will leave behind valuable clues and ultimately be caught.
READ MORE

Securing Extranets

March 05, 2001 |
Securing Extranets
READ MORE

Better security - for free

March 05, 2001 |
The Center for Internet Security (CIS) has just released its second security "benchmark," a collection of best practices and security settings meant to ensure a "prudent level of minimum due care for operating system security."
READ MORE

Barclay's secures online trades worth billions

March 05, 2001 |
Think online trading isn't safe? Barclay's Global Investors is betting billions you're wrong.
READ MORE

Security Providers

March 05, 2001 |
Security Providers
READ MORE

Figure 1

March 05, 2001 |
Figure 1
READ MORE

A Phased Approach to Enterprise Security Management

March 05, 2001 |
The global nature of today's businesses has resulted in an explosion of new systems, applications and interconnections that IT organizations must implement and maintain. This explosion of e-connectivity, while enhancing the level of service an organization can provide, has created a tremendous amount of exposure that has businesses and vendors alike scrambling for solutions to make everyone's resources safe and secure.
READ MORE

Asita, RapidStream offer up high-capacity VPN wares

March 05, 2001 |
A couple of new options are cropping up for companies that need high-speed virtual private (VPN) devices.
READ MORE

NETSEC makes the switch to managed security services

March 05, 2001 |
Add NETSEC to your list of options for security service providers.
READ MORE

PKI primer: the technology and the promise

March 05, 2001 |
Some security experts tout Public Key Infrastructure as the key enabling technology for E-commerce, the security safety net that will enable the buying and selling of goods online with the assurance that each party is who they say they are, that transactions will be completed as expected and that goods and services will be paid for.
READ MORE

Why we need security benchmarks and a plan for providing them

March 05, 2001 |
Why we need security benchmarks and a plan for providing them
READ MORE

Online retailers face privacy concerns on one hand while battling fraud with the other.

November 01, 2000 |
Security concerns with respect to business-to-consumer E-commerce come down to two issues: privacy and fraud.
READ MORE

ERUCES offers triple protection for databases

November 01, 2000 |
Dr. Bassam Khulusi learned about the need to protect the privacy of data from the patients he saw during his 20 years as a practicing physician. "When people feel like their privacy may not be ensured, they may not be completely forthcoming about what's wrong with them," he says.
READ MORE

Wireless computing and an increasing reliance on computing service providers bring new security risks.

November 01, 2000 |
Even while companies are struggling to come to grips with security requirements for existing e-commerce applications, a couple of key technology shifts are presenting additional challenges.
READ MORE

Building Trust in E-Commerce: ecomSecurity.com Launches

November 01, 2000 |
Welcome to ecomSecurity.com, your source for information on e-security products and services.
READ MORE

November 2000 News

October 01, 2000 |
November 2000 News
READ MORE

PKI Challenges

October 01, 2000 |
PKI Challenges
READ MORE

PKI-Related Vendors

October 01, 2000 |
PKI-Related Vendors
READ MORE