Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
If the U.S. Patent Office does what it has said it will do, companies using the Internet for computer-to-computer international trade will have to pay a royalty fee to Ed Pool. Mr. Pool, 45 years old, hails from this tiny lakeside . . .
This is part two that discusses many of the most significant events in e-commerce history. Read Part One first. "From the first electronic business transactions to heartstopping e-tail sales figures, e-commerce burst onto the scene in dramatic . . .
It has long been held that, in terms of a threat to IT systems, the protagonist would be an individual, skilled and knowledgeable, but at odds with the society surrounding them: typically, a college-educated, twenty-something male who found the challenge of . . .
Apache comes with built-in mechanisms for logging activity on your server. In this series of articles, I'll talk about the standard way that Apache writes log files, and some of the tricks for getting more useful information and statistics out of . . .
Virtual private networks merge IP technology with encryption to offer significant cost savings on WAN traffic.Sure you want a VPN. It can save you money. It can give you a better-meshed network. It can let more people share your enterprise resources . . .
Erick Lee writes: "Is a firewall enough to provide security to your network? The answer is no. A common misconception is that firewalls recognize attacks and block them. In fact, firewalls perform only limited, specific functions in network security." . . .
In this article, I start by discussing the weaknesses of each of the these absolutely horrid protocols. I then introduce secure shell (ssh) and provide an in-depth guide to using it. Before some of you write this off, realize that if . . .
Visa, the global credit card organisation, is so worried about online fraud it yesterday warned members and merchants they may be fined if they don't get their security provisions up to scratch. A call to tighten already strong security measures, you . . .
Internet service providers and dot-coms hit by a storm of denial-of-service attacks earlier this year should brace for another onslaught, say knowledgeable security experts. Simple Nomad, aka Mark Loveless, a senior security analyst at information management and security company BindView, unveiled . . .
When it comes to security, build for success, but plan for failure. eWEEK Labs' Openhack.com e-business site was built from the ground up with security in mind, and the site was co-designed and co-maintained by security company Guardent Inc. Yet Openhack . . .
"IPSec is beginning to support key business and technology objectives such as B2B extranet backbones and dial access VPN's for remote computing. Despite the security and operational benefits of a VPN, the problem of authenticating client entities for access control decisions . . .
Excite@Home -- an Internet service run in Australia by Cable & Wireless Optus -- has warned it will take action against anybody who attempts utilise an IP vulnerability that allows a single user to block up to 127 IP addresses, effectively . . .
The intent of this article is to familiarize the reader with the network scanner nmap. As Lamont Grandquist (an nmap contributor/developer) points out, nmap does three things: It will ping a number of hosts to determine if they are up. It . . .
Businesses are still not ready to take an enterprise approach to security, according to leading vendor Network Associates (NAI). Despite consolidation in the market - including the $975m buy-out of security firm Axent by anti-virus specialist Symantec last week - NAI . . .
Digital signatures require extensive safekeeping. Unlike passwords, you can't store them in your head. The number sequence is too long. You have to store the signature on a smart card, keep it on your hard drive, or carry it around on . . .
The enterprise of the future will need to have a flexible, general purpose infrastructure in order to survive in an economy increasingly defined by electronic commerce, according to Jamie Lewis, CEO of The Burton Group Corp. . . .
The Internet engineering community is developing technology that promises to minimize the damage these hacker attacks cause by quickly identifying the computer systems where they originate. . . .
Worries about security, and justified ones at that, could still stop the eCommerce bandwagon in its tracks, it seems. The recent revelation of a security loophole in MS Outlook has been followed by a report from IDC asserting that corporate Europe . . .
The Internet Engineering Task Force (IETF) last week launched a working group to develop ICMP Traceback Messages, which would let network managers discover the path that packets take through the Internet. Nicknamed itrace, the new working group plans to submit a . . .
The article examines the basic concepts pertaining to routing, network address translation (NAT), firewalls, and a program called ipchains. Individual sections address each concept. The last section combines the basics into a sample configuration for linking a local network to . . .