Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Author: admini

What is Endpoint Security?

Posted on July 13, 2005December 30, 2021 by admini

Almost 65 percent of respondents to the survey indicated they have an endpoint security solution in place.

Allan Carey, program manager of security and business continuity services at IDC, said survey participants’ definitions of endpoint security ranged from secure devices to firewalls and security policies. “One of the most surprising findings was the amount of confusion over what endpoint security means,” Carey told internetnews.com. “Depending on their perspective, IT or business, endpoint security took on different flavors of how to control the issue.”

“IDC defines endpoint security as centrally managed client security and likened it to a 21st century digitized watchdog protecting users from “a cesspool squirming with destructive technological deviants.”

But security vendor Check Point, which owns personal firewall application vendor Zone Labs, has a related but somewhat different definition. Rich Weiss, Check Point director of endpoint product marketing, explained that the term “endpoint security” means centrally managed personal firewall-based security and that it was popularized by Zone Labs in 2001.

“More recently, the term has become so popular that others are putting their own spin on it, and some organizations such as IDC include anti-virus in the definition,” Weiss told internetnews.com. “However, we believe that personal firewall-based security and anti-virus are still distinct markets. The original definition of endpoint security created by Zone Labs is still valid.”

Network risks have changed since 2001, though, and Check Point has expanded its definition.

“To meet the definition of a complete endpoint security solution today, a product must have a mature, proven network access control capability,” Weiss said. “Considering that the penetration of antivirus in enterprises is virtually 100 percent, IDC’s numbers make sense if you mix them with pure endpoint security adoption rates,” Weiss explained.

“We agree that anti-virus is effective at addressing threats that have been in the wild for a while. Organizations voiced their concern for point products trying to solve the problem, when a more comprehensive solution is required consisting of processes, policies and end-user awareness, in addition to technology,” IDC’s Carey said.

http://www.wi-fiplanet.com/news/article.php/3519791

Read more

Linux and Windows security neck and neck

Posted on July 13, 2005December 30, 2021 by admini

“A couple of years ago Linux was without doubt more secure than Windows, but things have changed a lot,” said Titterington. “My hunch would be that Linux still has the edge but it’s difficult to tell with all this misleading information being pumped out. Just doing a head count of vulnerabilities is useless, for example, if you’re not grading the seriousness of the vulnerabilities.”

He added that Microsoft had made real progress on security in the past two years, but that the increasing number of Linux enthusiasts coming into the market would help the open source alternative in the long run.

John Engates, chief technology officer at managed hosting company Rackspace, which offers both Linux and Windows hosted servers, said: “If you think about where you get Linux talent it’s in the younger generation. Linux has a slight advantage in that computer science students are learning it, but Microsoft has made life easier for non-techies, particularly with its improved patches.” Engates added that his company manages 13,000 servers, roughly half of which are open source and half Microsoft. He claims to see little difference between the security on either platform.

http://www.vnunet.com/vnunet/news/2139790/surveys-useless-security

Read more

Bank Of America Rolls Out New Online Security System

Posted on July 13, 2005December 30, 2021 by admini

“We definitely want to lead the industry by making online banking more secure,” Bank of America e-commerce executive Sanjay Gupta said. “Right now, more than 50 percent of (banking) transactions take place online.”

The Charlotte-based bank already leads the U.S. market with 13.2 million online banking customers and 6.4 million people who pay bills online.

Bank of America launched its new online security system, called SiteKey, last month in Tennessee. It is being rolled out this week in Virginia, Maryland and Washington, D.C., and should be available nationwide by the fall.

Several recent highly publicized security breaches have made fraud prevention a top priority for Bank of America and other U.S. banks. In May, Bank of America and Wachovia Corp. were forced to alert more than 100,000 customers when New Jersey police charged nine people, including seven bank workers, in a plot to steal financial records of thousands of bank customers. In February, Bank of America disclosed that it lost computer data tapes containing personal information on 1.2 million federal employees, including some members of the U.S. Senate. The lost data included social security numbers and account information.

While the new system wouldn’t have prevented those breaches, it’s a sign of how seriously the bank takes the issue of security, said Jim Stickley of TraceSecurity Inc., a Baton Rouge, La.-based computer security company. “I think the reason they are doing it is because of all the bad press they’ve been getting,” he said.

The challenge questions – all things that only the customer would be able to provide, such as the year and model of their first car – are then used along with a customer ID and a passcode to guard access to the account.

Because so many Web sites now require passwords, many Internet users have become careless and create easy-to-remember passwords that tend to be easy to guess.

http://www.informationweek.com/showArticle.jhtml;jsessionid=Q20WOK44VGIHOQSNDBNSKH0CJUMEKJVN?articleID=165702498

Read more

CIO Relationships Limit Outsourcing Success

Posted on July 12, 2005December 30, 2021 by admini

The research identified that nearly 65 percent of private sector CIOs are working with a number of outsourcers simultaneously, making effective management even more of a priority. In contrast to this, less than half 45 percent of public sector organizations had more than one outsource partner. Post-outsourcing, less than 7 percent of CIOs in the private sector had seen significant changes to their in-house skill set, whereas in the public sector the number experiencing a change was four times higher 28 percent.

This may indicate that the public sector is developing relationship management abilities in its in-house teams, as well as giving them the opportunity to learn new skills in support of their core businesses.

“CIOs are looking for their teams to manage the overlaps and interfaces of multi-vendor relationships effectively. It is only those organisations that do get it right who will get the most out of outsourcing,” said Ben Booth, MORI CIO.

http://www.ebcvg.com/articles.php?id=803

Read more

Oracle integrates Web services, security products

Posted on July 12, 2005December 30, 2021 by admini

Because Oracle plans to combine the BPEL (Business Process Execution Language) tool with its Oracle Web Services Manager product, software developers will no longer have to spend as much time explicitly writing out security policies while using the BPEL Process Manager, said Prakash Ramamurthy, vice president of server technologies with Oracle.

Instead of purchasing a separate Web services orchestration engine and security tool, customers will now be able to purchase a combined product, Ramamurthy said.

Developed by the Oasis Consortium, it expected to play an increasingly important role in online commerce.

Ramamurthy did not say when the combined product would be available or what it would cost.

http://www.networkworld.com/news/2005/071305-oracle-web-services.html

Read more

Yahoo, Cisco Merge E-Mail Specs

Posted on July 11, 2005December 30, 2021 by admini

The Domain Keys Identified Mail (DKIM) specification is the combination of two related, competing, technologies: Yahoo’s Domain Keys and Cisco’s Identified Internet Mail (IIM).

While the two technologies are similar in concept in that they both use signature-based public key technology to authenticate e-mails, they had some hurdles to overcome before they could be merged.

Talks to get the specification approved as an Internet standard stalled last year in a working group following concerns over Microsoft’s licensing of the technology and the patents found in the technology.

Both Yahoo and Cisco had intellectual property rights attached to their individual technologies, though officials were unavailable at press time to say whether they remain in the combined technology.

It’s also uncertain what type of license will be attached to the technology, though Crocker said Yahoo has been working to make sure the license is compatible with the open source community.

http://www.internetnews.com/bus-news/article.php/3519066

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme