Cyber Security Institute

Thursday, September 30, 2004

Botnet-related crime is beginning to indicate to the experts what they might expect next

Security experts are beginning to see a pattern in cybercrimes.  According to communications firm Energis, online crime appears to be occurring in cyclical patterns related to the creation of botnets—zombie armies of PCs that have been taken control of without the owners’ knowledge.

MORE...

Feds fund secure ID project

The federal government has signed a deal with security company Digimarc for a pilot program to study hacker-resistant digital authentication for state driver’s licenses.

MORE...

Tuesday, September 28, 2004

Why security is an information problem

Speaking at the ZDNet UK IT Priorities Conference held in the Park Lane Hotel, London, Simon Perry, VP security at Computer Associates, warned that employees currently understand the material value of the hardware they are entrusted with but haven’t been taught to value company information in the same way.

MORE...

Upgrades, HR costs squeeze British tech budgets

Windows upgrades and IT staffing costs remain the biggest drains on British corporate IT budgets, with operational expenses reducing the amount of money left for new investment, according to a new report.

MORE...

Monday, September 27, 2004

Passwords Fail To Defend Enterprises

Passwords, the dominant form of securing enterprise assets, are a failure, a research firm said Thursday.

MORE...

Friday, September 24, 2004

Phishers Fake FDIC Web Site

Phishers spoofed the Federal Deposit Insurance Corporation’s (FDIC) again and using bogus e-mails, tried to entice consumers to sign up for non-existent service that tracks suspicious activity on credit, debit, and bank ATM cards.

MORE...

Linux firms join forces on security

A consortium including Mandrakesoft, the Paris-based Linux seller that recently exited bankruptcy protection, has won a three-year contract worth 7m euros to improve Linux security.

MORE...

Thursday, September 23, 2004

Ex-NetScreen CEO takes on new start-up

Can the former chief executive officer of NetScreen Technologies make history repeat itself?  A small start-up called Infoblox is banking on it.

MORE...

Only XP SP2 Secure Internet Explorer

If you’re one of about 200 million people using older versions of Windows and you want the latest security enhancements to Internet Explorer, get your credit card ready.

MORE...

CEOs Stagnant on Security

CEOs aren’t doing enough to address the myriad IT security threats that loom large.  At least that’s what Ernst & Young concluded from survey results it released.

MORE...

Nokia Phone Adds Virus Protection

MORE...

Microsoft Changes Its Tune on Porting SP2 Fixes

Microsoft has been reticent to commit publicly to how, when and if it would make the browser-specific security fixes that it delivered as part of Windows XP Service Pack 2 available to users of older versions of Windows.

MORE...

New technology increases threats

New technologies will make existing information security measures obsolete over the next five years, according to analyst Gartner.  And an increase in IT outsourcing will be one of the biggest challenges for chief security officers, who will have to find new ways to safeguard networks, develop data privacy guidelines and protect intellectual property.

MORE...

Wednesday, September 22, 2004

Toyota: Some security firms promise too much

The head of information security at Toyota spoke candidly to an audience of press, analysts and IT bosses about his concerns over claims made by some security vendors and resellers.

MORE...

Microsoft releases VPN patch for SP2

Microsoft has announced it is to patch a patch—it’s fixed a hole in XP Service Pack 2 that prevented VPNs from working properly.

MORE...

4 must-have security solutions

The corporate network has no boundaries anymore.  Employees, contractors and business partners might connect to an organization?s network via laptop computers, PCs or servers from almost any point, including branch offices, homes, hotel kiosks or airport terminals.  How do you make sure that these machines comply with corporate policies and are updated with the correct security patches and configured properly?

MORE...

P-cube goes hunting for zombie PCs

P-Cube, the traffic management firm Cisco agreed to buy for $200m last month, is aiming to tackle the problem of spam at source by detecting and quarantining spam zombie machines.

MORE...

Tuesday, September 21, 2004

VeriSign bundles authentication tools

VeriSign introduced its latest package of authentication tools and said it will deliver a version of the product designed specifically for Microsoft’s Windows later this year.

MORE...

The Best Practices of Highly Secure Organizations

The “2004 Global Information Security Survey,” the largest ever conducted, shows that information security is improving and best practices are emerging.  [Editor’s note: Great charts in this web article, well worht a visit]

MORE...

Ford in Major Shift to VoIP

Ford Motor Co. (Quote, Chart) will move 50,000 employees at 110 facilities to Voice over IP (define) calling, a ringing endorsement for the emerging technology’s performance and reliability.

MORE...

Monday, September 20, 2004

Viruses keep on growing

The volume of worms and viruses is increasing, but the rate of successful attacks has dropped, according to a new report from Symantec.

MORE...

Gartner: Information security is still key

Despite claims from some quarters that security will cease to be a key issue over the next few years, Gartner stressed today that information security will remain a major executive concern for the foreseeable future.

MORE...

Gartner Debunks Six Information Security Myths and Counsels Enterprises Where to Invest for Maximum

Presenting Gartner’s IT Security Scenario in front of 650 attendees at the Gartner IT Security Summit in London today, Victor Wheatman, managing VP Security, debunked six myths that proliferate in the information security industry.

He also advised enterprises which security technologies they should prioritise and which they could avoid in the years to come.

MORE...

Microsoft Targets Continuity with Data Protection Server

Microsoft Corp. officials said the company will expand its storage portfolio and vision deep into the lucrative disk-based backup and recovery arena next year.

MORE...

Hackers costing enterprises billions

Hackers continued adding billions to the cost of doing business on the Internet in the first half of 2004, despite security executives’ efforts to prevent malicious attacks.

MORE...

Gartner analysts point out the security you don’t need

The plethora of security technologies on the market are enough to overwhelm even the most knowledgeable IT managers, but in sorting through all of the options, it may be helpful to look at what is not needed, according to Gartner research detailed recently in London at its IT Security Summit conference.

MORE...

Friday, September 17, 2004

Cisco, Microsoft in network security showdown

Cisco Systems and Microsoft are headed for a collision over network security, with customers caught in the middle.

MORE...

Spam most destructive in China’s Internet security

The Ministry of Public Security released on September 14 the result of the nation’s inaugural survey on the Internet information security and computer virus: the infection rate of the computers of users in China is 87.9 percent and 36 percent of the security incidents are caused by massive spam transmission.

MORE...

Wednesday, September 15, 2004

Who spends what on computer security?

What price security? Somewhere between $110 and $334 per employee, depending on the size of your company.

MORE...

Tuesday, September 14, 2004

Sun touts tougher security in Solaris 10

Sun Microsystems said its Solaris 10 operating system will be ready for general release by year’s end, complete with a sharper set of security teeth.

MORE...