Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Month: September 2004

VeriSign bundles authentication tools

Posted on September 21, 2004December 30, 2021 by admini

The package of security software and services, which incorporates elements of the company’s VeriSign Intelligence products and ControlSM Services, provides a centralized system for supporting various forms of network authentication, including passwords, smart cards and USB tokens, according to the Mountain View, Calif.-based maker of network security software.

By letting customers integrate multiple network-identification techniques, VeriSign says the product, dubbed VeriSign Unified Authentication, can save companies significant time and effort, while providing more secure IT systems protection.

The tools is set to become available Sept. 30.

VeriSign, which also serves as an Internet domain registry, said the package will let customers use existing security technology built into so-called directory services products, such as Microsoft Active Directory, Radius servers, and single-sign on infrastructure, including identity management software made by IBM’s Tivoli unit.

The company will offer the option for buyers to manage their own authentication operations or outsource those responsibilities to VeriSign using a hosted version of service. Executives at the company said the system will cost roughly $25 per user each year.

In addition to introducing the authentication package, VeriSign announced that it will release a Windows-specific version of the system later this year.

The company acknowledges that it would prefer customers to buy its entire Unified Authentication package, but it has created a version designed to integrate its security tools with elements of Microsoft’s Windows Server 2003 operating system. VeriSign said the package was created through a relationship it has established with Microsoft.

Known primarily for its role as one of the Internet’s primary sources of domain registry services, VeriSign has been pushing hard to build its network security business. Earlier this year, the company announced that it had won a multiyear agreement to provide security services for financial giant U.S. Bancorp; it has a similar deal in place with Merrill Lynch.

http://news.com.com/VeriSign+launches+authentication+tools/2100-7347_3-5375225.html?part=rss&tag=5375225&subj=news.7347.5

Read more

Ford in Major Shift to VoIP

Posted on September 21, 2004December 30, 2021 by admini

SBC Communications (Quote, Chart) will design, install and manage the project using IP phones and network equipment from Cisco Systems.

The Ford VoIP deployment will occur over three years and impact the headquarters and other facilities in southeast Michigan.

Profits aside, the Ford contract could serve as a case study for SBC and Cisco to present to other large corporations that may have misgivings about VoIP.

Ford is expected to save money over its Centrex (define) phone system in several areas, including the decrease in its long-distance bills. The company also expects system maintenance to decline by shifting voice and data onto a single IP network. Also, IP telephony service makes handling employee moves more efficient, because businesses can scale up or down without calling vendors or ordering new cards.

http://www.internetnews.com/infra/article.php/3410681

Read more

Cisco Named One Of Top Three Most Trusted Security Vendors

Posted on September 21, 2004December 30, 2021 by admini

Cisco has been ranked as one of the top three most trusted security product vendors and one of the top three most trusted security service providers in two surveys done by the Yankee Group.

The Yankee Group 2004 Managed Security Services Survey found that of 606 enterprises, Symantec, Cisco and VeriSign rank as the three most trusted security service vendors. In another survey, the Yankee Group 2004 Enterprise Security Services survey, Cisco, Cisco, Symantec, and Network Associates ranked as the three most trusted vendors of security products.

Waterfield also noted that firewalls and antivirus tools are the security products most valued by enterprises.

http://www.networkingpipeline.com/showArticle.jhtml?articleID=47900555

Read more

Gartner: Information security is still key

Posted on September 20, 2004December 30, 2021 by admini

Gartner says the next five years will see new waves of technology rendering existing information security measures obsolete, increasing security exposures in both new and legacy environments.

Wheatman notes how, in recent years, key technologies have forced a constantly changing security environment. “In the same way that PCs broke the host-centric security model, networked PCs eroded the gains that had been won in securing individual desktops. Then we saw how distributed applications running across LANs reset security maturity to zero, while the inclusion of external networks as a part of the topology reset client/server security.”

In addition to the constant cycles of technology change that has kept ICT security managers working overtime in recent years, Gartner points to the cyber threats that will ensure information security threats remain constant over the next few years.”

To enable security managers to evaluate the risks facing their enterprises, Gartner has developed a cyberthreat hype cycle, mapping out the threats that must be taken into consideration.

Gartner says that for those who thought that the information security risks they have battled with in recent years were all but over, this may well be unwelcome news.

In conclusion, Wheatman states: “Perfect security is impossible, but continual scanning for new vulnerabilities and monitoring for new threats is critical and a much better investment than to passively sit back and wait to detect attacks.

http://www.ictworld.co.za/EditorialEdit.asp?EditorialID=20006

Read more

Gartner Debunks Six Information Security Myths and Counsels Enterprises Where to Invest for Maximum

Posted on September 20, 2004December 30, 2021 by admini

Myth 1 — ‘Spend on more stuff; continue to spend on everything else’
Gartner predicts that by 2006, information security spending will drop from an average of six to nine percent of IT budgets to an average of four to five percent as enterprises improve security management and efficiency. It is the improvement in management that holds the key to a more secure enterprise. Wheatman therefore advised information security managers to develop realistic company specific cost/risk models and provide a clear roadmap of where their efforts are leading. Mr Wheatman stressed that to achieve this, funding must shift over the next five years from traditional solution purchasing to a better-defined risk management process involving investment in three objectives. Gartner identifies these as 1. keeping the bad guys out 2. letting the good guys in and 3. “keeping the wheels on” (that is maintaining operations).

Myth 2 — ‘Security is a journey, not a destination’
The key question to answer is “Are we more secure now than we were last year?” Wheatman advised information security managers to develop realistic company specific cost/risk models and provide a clear roadmap of where their efforts are leading. Warnings without realistic plans will not achieve management buy-in.

Myth 3 — ‘Software has to have flaws’
Gartner estimates that even if only 50 percent of software vulnerabilities were removed prior to the software being put into production, enterprise configuration management and incident response costs would be reduced by 75 percent each Gartner estimates that there are only 500 software engineers worldwide with the skill and knowledge necessary to scan code for security problems efficiently and effectively. Wheatman urged enterprises to demand proof of safer software when procuring software, while companies that develop software internally should review the code with security in mind.

Myth 4 — ‘Next Year Is the Year of…’
Every year enterprises are urged to invest in the latest solutions to safeguard their business, and yet, each new wave of technology disrupts existing security measures and introduces new vulnerabilities. In the case of information security, failing to deploy defensive solutions at the right time can leave the organisation vulnerable. Wheatman warned that investing in security technology too early can result in a complete waste of enterprise security funds and he advised organizations to focus on their specific business needs and complete a threat assessment to prioritise security requirements.

Myth 5 — ‘Regulations Matter’
A variety of regulations and new laws, such as the Health Insurance Portability and Accountability Act, European Union Privacy Directive or the Sarbanes-Oxley Act, have an element of information security implied. Regulations shouldn’t really matter.

While important not to rush into acquiring new products and services eagerly promoted by security vendors as ‘HIPAA- or SOX-compliant’, Mr. Wheatman said that regulations do attract management attention and can consequently make budget processes somewhat easier.

Myth 6 — ‘Business units that care about security walk the security walk and talk the security talk’
It is not enough for security managers to understand the technologies, the specific threat metrics or the buzzwords of the solutions available to address risk. To be effective, security managers need to place themselves in the role of business managers and be able to translate technically oriented information security for the enterprise into business terms.

The Way Forward
Only by cutting through the hype and looking beyond the myths that abound, can security managers take their enterprises forward. Gartner strongly counsels against investing in an over-hyped technology too early. Using it’s Information security hype cycle, Gartner has identified the security technologies it believes enterprises will need over the next five years as well as those that enterprises probably don’t need before 2009.

Although some enterprises will benefit from technologies in the ‘don’t need’ column, for example, digital signatures, they are exceptions. For the most part, the list of ‘don’t needs’ can be avoided. Vulnerability management not only implies advancement from passive vulnerability monitoring to near-continuous monitoring, but also integration with workflow and rule engines to effectively correct vulnerable states without creating system conflicts.

Gartner predicts that with security spending intentions high, and with increasing threats and regulatory requirements, the next 12 to 18 months promise opportunities for security professionals to leverage executive attention and to demonstrate value. However, failure to reduce highly visible threats, such as spam and increasingly creative viruses and worms, or overspending to meet legislative initiatives, could lead to questions about the skills and relevance of in-house security professionals, and more inclination to use external consultants and outsourcing solutions.

http://www4.gartner.com/5_about/press_releases/asset_106327_11.jsp

Read more

Hackers costing enterprises billions

Posted on September 20, 2004December 30, 2021 by admini

Motivated increasingly by money, the hackers are amassing legions of unwitting bot computers for distributed denial-of-service (DDoS) attacks.

They are also exploiting Web applications and mobile devices to steal identities through e-commerce scams, including phishing.

These are some of the worrisome conclusions drawn by the Cupertino, Calif.-based security vendor Symantec Corp. in its semi-annual Internet Security Threat Report released today.

“We’re no longer talking strictly about the male teenager with the low moral compass, or the hactivist, who defaces sites or uses malicious code or worms against those on one side in a political conflict,” said Vincent Weafer, senior director of Symantec Security Response.

The daily volume of Internet-based worm attacks decreased in the first half of the year, according to Symantec.

http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1007181,00.html

Read more

Posts navigation

  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 9
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme