Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Author: admini

Secure Your Shredding

Posted on June 21, 2005December 30, 2021 by admini

Shredders themselves come in two basic varieties, strip-cut and crosscut.

A strip-cut shredder cuts the paper into strips ranging from a quarter-inch to a half-inch wide. Strip-cut machines are more popular because they are usually less expensive, tend to be quite durable and generally shred faster than crosscut models.

With crosscut shredders, documents are cut in two directions, producing very small particles. Rather than cutting paper into strips, crosscut shredders reduce it to smaller particles—resembling rectangular confetti and measuring approximately one-quarter inch by 1.5 inches—and provide much more security than strip-cut machines. Because the particles are so small, they are self-compacting, reducing overall bulk.

Cody Ford, president and CEO of Houston-based ChurchStreet Technology Inc., had observed the Enron Corp. financial meltdown when he was working at Enron as an IT consultant. ChurchStreet’s proprietary Strip-Shred Reconstruction and Cross-Shred Reconstruction suites enable companies to have their shredded documents reconstructed. With the exception of work done for government intelligence agencies, all client document reconstruction is done on ChurchStreet premises with ChurchStreet’s equipment.

The process basically works this way: Once ChurchStreet technicians receive document shreds from a client, they determine whether the original document can be salvaged. With a crosscut reconstruction, it is much more important that the collection bag be as undisturbed as possible, given the amount of shredded data.

Companies that blindly shredded documents in the past must now take a much more formal—and thoughtful—approach to what they want to shred and how they want to shred it. In 2005, nothing is simple in security, especially shredding a piece of paper.

http://www.eweek.com/article2/0,1759,1830203,00.asp?kc=EWRSS03119TX1K0000594

Read more

Sun To Ship Identity Management Federation Services

Posted on June 20, 2005December 30, 2021 by admini

The new products are designed to allow customers to extend identity management beyond traditional boundaries to partners, suppliers, new devices and external applications, Sun executives said.

For example, Federation Manager will help customers create secure partner networks by automatically linking identities across multiple sites, said Eric Leach, director of product management for Sun Java System Federation Manager at the Santa Clara, Calif.-based vendor.

With the Service Provider Edition, customers and service providers will get a tool for automating provisioning and account registration through portals, according to Sun. Customers also will be able to create new applications and customize services from third-party providers.

The services, which are slated to be delivered in the Release 2 edition of Windows sServer, will offer cross-company authentication of users, devices and resources. Sun executives said their company’s new federation products support industry standards and will complement Sun and Microsoft’s work to enable interoperability between their platforms.

For example, Sun’s Federation Manager supports Security Assertions Markup Language (SAML) and several standards backed by the Liberty Alliance, including the Liberty Identity Federation Framework and the Liberty Identity Web Services Framework.

http://www.crn.com/showArticle.jhtml;jsessionid=OJO1SYHLB2MCGQSNDBNCKH0CJUMEKJVN?articleID=164901103

Read more

CA Integrates Backup And Security For Small Companies

Posted on June 20, 2005December 30, 2021 by admini

The suites include the Desktop Protection Suite and the Server Protection Suite, which protect data stored on PCs and servers, respectively. The Business Protection Suite and business protection suites for Microsoft Small Business Server standard and premium editions protect data on both personal systems and servers. The suites will be available in July through the reseller channel, priced at between $325 and $1,099 for a five-user license.

The suites offer combinations of CA’s Desktop DNA Migrator, eTrust Antivirus, eTrust Pest Patrol Anti-Spyware, and BrightStor ARCserve. The DNA Migrator captures and transfers user settings during PC refreshes, operating-system recovery, or database recovery. The antivirus product automatically updates virus signatures while helping to fend off viruses. Pest Patrol detects and removes spyware, Trojans, and other threats. And ARCserve helps customers back up data and restore it during outages.

An industry analyst thinks the protection suites are an energized entry for CA. “It’s a growing market, confusing to customers, served with a pile of point products,” says Ray Boggs, an analyst at IDC. “So CA is bringing in a complete system for the small companies who need something more comprehensive. They want to stop choosing à la carte.”

http://www.informationweek.com/showArticle.jhtml;jsessionid=OJO1SYHLB2MCGQSNDBNCKH0CJUMEKJVN?articleID=164901111

Read more

Bosses on the prowl for risque pics

Posted on June 17, 2005December 30, 2021 by admini

The report, sponsored by software company PixAlert and conducted by research firm Delta Consulting, also found that when businesses pursued an investigation, 44 percent of cases resulted in a dismissal from the company.

The study is the latest to indicate that companies are keeping close track of employees in the work place. A report released earlier this month found that 63 percent of corporations with 1,000 or more workers either employ or plan to employ staff to read or otherwise analyze outbound e-mail.

And according to a study earlier this year, the number of companies that monitor the amount of time employees spend on the phone and track the numbers called has jumped to 51 percent, up from 9 percent in 2001.

Though liability and regulatory issues may be convincing companies to peek in on their employees, such surveillance raises privacy concerns. Employers can monitor workers to a greater degree these days, thanks to newer technologies such as keystroke-logging software and satellite global positioning systems that can track a cell phone user’s whereabouts.

http://news.zdnet.com/Bosses+on+the+prowl+for+risque+pics/2100-9595_22-5752067.html?part=rss&tag=feed&subj=zdnn

Read more

Symantec to unveil security intelligence tools

Posted on June 17, 2005December 30, 2021 by admini

Additionally, they will let users correlate their data with security intelligence from Symantec’s DeepSight Threat Management System. This analysis of security data could give customers a better view of the attacks waged on their networks and help them raise more-effective shields, Symantec said. The Security Information Manager editions will succeed a current software product called Incident Manager.

The appliances will be easier to install and can crunch through data faster than Incident Manager, according to Symantec. The 9550, priced at $59,000, is the main device, while the 9500, which costs $39,000, would be used as an extra node in a cluster, the company said. Both devices are 2U rack-mountable Linux-based servers with dual 3GHz Intel Xeon processors. The 9550 has more RAM memory than the 9500 and features 1.2 terabytes of storage space, Symantec said.

http://news.com.com/Symantec+to+unveil+security+intelligence+tools/2110-7355_3-5752072.html?part=rss&tag=5752072&subj=news

Read more

Windows 2000 Still Running On Half Of Corporate PCs

Posted on June 15, 2005December 30, 2021 by admini

Administrators and managers may not want to hear it, but Windows 2000 is reaching the end of its supported life.

According to a report from AssetMetrix, Windows 2000 does still feature greatly in many enterprises. Windows 2000 dropped only four percentage points, from 52 to 48 percent, in its popularity in corporate IT environments.

Bigger companies seem more prone to keeping Windows 2000. In the study, AssetMetrix found that businesses with fewer than 250 employees were more likely to be running Windows XP already.

http://www.webpronews.com/news/ebusinessnews/wpn-45-20050615Windows2000StillRunningOnHalfOfCorporatePCs.html

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme