- Welcome Guest
- Sign In
New-age warfare is here. Governments and Internet security firms are quietly gearing up for the potential onslaught. Don't think that cyber warfare is merely fuel for novel writers. Cyber attacks are being waged in increasing numbers. Computer network attacks are often perpetrated by gangs of crimin...
For enterprises, the primary reason for adopting Voice over Internet Protocol phone service is money. Long-distance phone calls placed over the Internet typically cost a mere fraction of those placed under the business rate plans offered by traditional telephone companies. As a result, the business ...
Web application vulnerabilities put critical business applications and back-end databases at risk from attack, theft and fraud. The Payment Card Industry Data Security Standard, which recognizes the threat Web application vulnerabilities pose to credit card data, allows organizations to choose betwe...
Passwords are not the best of security solutions, as enterprises and individual users have found over the years. They can be cracked or stolen, and not necessarily by high-tech means either. Often, passwords created by end users in corporations are simple, being based on numbers significant to them:...
As corporations implement compliance with various regulations such as Sarbanes-Oxley, they find that they end up with different zones within their network that can't talk to each other. This makes it difficult to implement an enterprise security solution. Adding virtualization to the mix complicates...
The face of online security will change drastically, Jim Bidzos, founder and chairman of trusted certificates vendor VeriSign, said in a keynote speech on Wednesday at the RSA Security Conference in San Francisco. "In the '70s in enterprises, there were mainly mainframes. The Internet, due to good w...
How do you respond when hit by a cyber attack tsunami? That's the question Cyber Storm II, the most comprehensive cyber exercise ever held in the U.S., was designed to answer. Forty private sector companies, 11 Cabinet-level agencies, 10 states and five countries were involved in the March exercise,...
After working for years to prevent cyberterrorist attacks on the U.S., the Department of Homeland Security has approached the private sector for help. At a talk given to information security professionals at the RSA Security Conference, Homeland Security Secretary Michael Chertoff warned that a cybe...
Microsoft has unveiled the public beta of its Forefront enterprise security product, known as "Stirling." This is a single product that delivers coordinated protection across desktop and server applications and the network edge. It comes with a single dashboard that shows all the systems protected b...
IBM unveiled a new research initiative intended to solve problems associated with virtualization and security Tuesday in San Francisco at RSA 2008. Code-named "Phantom," the project will be run jointly by IBM X-Force threat analysis team and IBM Research. The project seeks to create virtualization s...
Secure Web gateway products vendor Finjan unveiled version 9.0 of its Vital Security Web appliance on Monday at the RSA Security Conference. This includes a new active real-time inspection technology that checks both inbound and outbound Web traffic and SSL traffic for malicious content to provide e...
It's quiet on the streets of San Francisco today, the first day of the RSA Security Conference, being held at the Moscone Convention Center south of Market Street. Traffic on the streets is light, so either the cops are doing a good job redirecting the crazy San Francisco traffic, which in this area...
Early adopters are typically characterized as progressive risk-takers who have little to lose and much to gain. Following this logic, it makes perfect sense that within this crowd we find bot herders -- hackers who control a large number of compromised PCs for malicious purposes. Yet it's unsettling...
The business use of e-mail worldwide has become so critical that the ever-increasing number of spam attacks containing malware are placing corporate and customer information at the highest levels of risk yet, according to an industry-wide survey Internet security firm Webroot conducted last month. W...
WiFi features are as standard on today's portable computers as built-in modems used to be. Laptop users have become accustomed to the ability to connect to the Internet from practically anywhere to reach e-mail, Web sites and music download portals. Consumers even use wireless routers to connect to ...