Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
The threats to a directory are many, and if appropriate safeguards are not maintained, a company may not even know when a directory has been compromised. The primary threats include theft, destruction and alteration of information (including user privileges). The potential . . .
IPSec, supposedly the next great thing that will fix most (if not all) our network security problems. No longer will attackers be able to sniff network traffic, hijack connections or spoof servers. Hijacking domain names will be impossible with DNSSEC, and . . .
The head of broadband services at BT has acknowledged that its implementation of ADSL lacks security and it will be up to third parties to ensure customers' data is unhackable. Chris Gibbs, who is masterminding the introduction of ADSL in . . .
Here's a great article by the SANS director, Alan Paller. "The recent distributed denial-of-service attacks on sites such as eBay and Yahoo were directly enabled by security mistakes almost certainly made by unskilled systems administrators at the University of California . . .
Here's a pretty good article on steps that can and should be taken to improve the level of security on your network. " Today, security is often provided by patched-together, reactionary defenses, which many see as an inhibitor to business. . . .
For businesses trying to protect themselves, there are big challenges. It's expensive, both in terms of capital and skilled labor, to secure networks, mobile workers, and E-commerce operations. Security staffs are being asked to deploy a growing number of security applications, which by their very nature are complex. . . .
The proliferation of Internet technologies has helped fuel the telecommuting wave with its mobility and connectivity needs, but it's been a double-edged sword as that very mobility has increased security threats to networks from dial-up and wireless access. While companies . . .
Computer data errors come in all shapes and sizes. One causes a minor mishap, like a 1-cent difference in the price of a gallon of milk because a scanner misread the bar code. Another triggers an error avalanche, like the glitch . . .
Small and medium-sized enterprises (SMEs) doing business on the Internet and via e-mail open themselves to breaches of their network security. A recent report by the Gartner Group states that by 2003, 50 percent of SMEs who manage their network security themselves and use the Internet will experience Internet attacks.. . .
Changes to the UK Government's "snooping" bill have done little to limit the power it gives police to spy on citizens, say civil liberty campaigners. Last week the Government announced changes to the Regulation of Investigatory Powers bill which it says . . .
The National Institute of Standards and Technology has begun a multi-year effort to move its paper-based practices online and enable the agency to use electronic signatures. Because these processes require employee and administrative signatures, NIST will create a public key . . .
SSH is an encrypted connection to a remote host running an SSH server. It gives you the ability to log on to a system with an encrypted session so that everything -- your name and password as well as your keystrokes . . .
Why do vendors ship software that they themselves won't use? Most Linux vendors ship the same general packages - Sendmail for SMTP mail services, WuFTPD for FTP, Telnet for remote access and so on. The kicker, though, is that most of . . .
Personal Digital Assistants, such as PalmPilots and Pocket PCs, pose a security threat for a number of reasons: they are relatively new; their small size and low cost make them easy to obtain and difficult to control; they have tremendous connectivity . . .
In South Africa executives are becoming aware of the security issues affecting their company's technology infrastructures. But because security is essentially intangible, many feel they are either over or under protected. The key to well-implemented security is to make sure that it is effective and that it does the job it needs to do. Analysis, not fear, should be what drives decisions.. . .
Wired News reporter Chris Oakes has interviewed some scientists who observed all kinds of hackers in their natural habitats, and he has a few thoughts about all this cracker/hacker, spy vs. spy business. . . .
How a Secret Service agent, a data recovery expert and a federal prosecutor team to secure the first ever conviction on federal computer sabotage charges. "Lloyd, a former network administrator at Omega Engineering Corp., thought he had not only destroyed his former employer's manufacturing capabilities, but also had destroyed the evidence that would link him to the crime as well.. . .
ParaProtect, a network security portal in Alexandria, Va., reports that 90% of the security breaches its technicians work on are based on attacks from within. Even more shocking is that upwards of 50% are caused by the company 's own network . . .
This article includes information from the recent SANS report, discussion of what can be done about this problems, and more. "Security problems are growing more numerous as knowledge and the number of Internet-connected systems grow. The number of reported security . . .
"Criminals have always been ahead when it comes adopting new technologies, but never before has there been anything like the Internet, which means that a few malicious keystrokes in one part of the world can cause huge problems for a corporation . . .