Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Author: admini

SSL VPNs Will Grow 54% A Year, Become Defacto Access Standard

Posted on January 5, 2005December 30, 2021 by admini

Spending on Secure Sockets Layer Virtual Private Networks (SSL VPN) will grow at a 53% compound annual growth rate, and SSL VPNs will surpass traditional IPsec VPNs as the de-facto remote access security standard by 2008, according to a new report from Forrester Research.

In “SSL VPNs Poised for Significant Growth,” Forrester associate analyst Robert Whiteley says companies are attracted by the technology’s application-level simplicity.

Unlike IPsec VPNs, which require special client software to access the network, SSL VPN supports a wide range of devices, from desktop computers to PDAs, and applications, while offering network administrators greater granularity of user information and providing better endpoint security.

According to the report, some 44% of American businesses have deployed SSL VPNs, spending $97 million on the technology last year alone. Despite the impressive adoption rate for a technology that has been in the business mainstream for less than a year, Forrester expects SSL VPN deployments to continue to take off, with the market growing at a 53% compound annual growth rate to $1.2 billion in 2004.

SSL VPNs are already well-entrenched in the financial and business services industries and in the public sector. Driven by the need to ensure endpoint security for online services, the financial services industry can boast a 56% penetration rate, with business services just behind at 51%.

In both cases, Whiteley predicts a compound annual growth of 34% to 2010 which, though impressive, pales beside the expected SSL VPN growth in late-adopting industries. Indeed, Whiteley writes that retail and manufacturing are poised to leap into SSL VPN with gusto over the next few years.

“Retail and wholesale allocates 7.8% of its IT spend to security — more than even financial services,” he notes.

http://informationweek.com/story/showArticle.jhtml?articleID=56900844

Read more

A Long Way to Grow

Posted on January 5, 2005December 30, 2021 by admini

The charts on the following pages reflect first results from the Security Capability Model, a survey tool codeveloped by CSO and Carnegie Mellon University’s CERT Coordination Center (CERT/CC) to help respondents compare their security processes—particularly pertaining to information security—with those of other organizations.

The Security Capability Model obviously draws some inspiration from the Capability Maturity Model (CMM), a rigorous tool for process management in software application development created by CMU’s well-known Software Engineering Institute (SEI).

They don’t yet feel there’s a long enough history” to clearly state what constitutes “mature” information security practices.

Methodology The Security Capability Model survey was posted online at CSO’s website and at the CERT website.

The industries most heavily represented in the response base were finance/banking/accounting (14%), health care/pharmaceutical (12%), manufacturing (11%) and government (10%).

In lieu of attempting an absolute standard for correct or mature practices (though a variety of those already exist elsewhere, ranging from ISO standards to SEI’s own Octave risk management methodology), the model provides the opportunity to benchmark against others in 22 specific practices.

One chart presents the full survey results, grouping the practices under four headings: managing risks, setting policies, securing systems and networks, and handling corporate security.

Looking at the first practice area on the chart, 60 percent of the total response base said they have a process in place for conducting regular vulnerability assessments.

For comparison, the model also measures corporate security capability in a few areas outside of infosec: facility access, business continuity plans, employee awareness training and background checks.

Allen says more capable—and successful—organizations are those treating security as a business objective; these companies achieve regulatory compliance by documenting existing processes, rather than by scrambling to jury-rig new processes to meet the letter of the law.

http://www.csoonline.com/read/010105/survey.html

Read more

Cyber crime booms in 2004

Posted on December 30, 2004December 30, 2021 by admini

The count of known viruses broke the 100,000 barrier and the number of new viruses grew by more than 50%. Similarly phishing attempts, in which conmen try to trick people into handing over confidential data, are recording growth rates of more than 30% and attacks are becoming increasingly sophisticated.

Also on the increase are the number of networks of remotely controlled computers, called bot nets, used by malicious hackers and conmen to carry out many different cyber crimes.

One of the biggest changes of 2004 was the waning influence of the boy hackers keen to make a name by writing a fast-spreading virus, said Kevin Hogan, senior manager in Symantec’s security response group. Although teenage virus writers will still play around with malicious code, said Mr Hogan, 2004 saw a significant rise in criminal use of malicious programs.

The financial incentives were driving criminal use of technology, he said. The Anti-Phishing Working group reported that the number of phishing attacks against new targets was growing at a rate of 30% or more per month. Those who fall victim to these attacks can find that their bank account has been cleaned out or that their good name has been ruined by someone stealing their identity.

This change in the ranks of virus writers could mean the end of the mass-mailing virus which attempts to spread by tricking people into opening infected attachments on e-mail messages.

The opening months of 2004 did see the appearance of the Netsky, Bagle and MyDoom mass mailers, but since then more surreptitious viruses, or worms, have dominated.

Mr Hogan said worm writers were more interested in recruiting PCs to take part in “bot nets” that can be used to send out spam or to mount attacks on websites.

Anti-spam firms report that, in many cases, legitimate e-mail has shrunk to less than 30% of messages.

In the past, threats to smart phones have been largely theoretical because the viruses created to cripple phones existed only in the laboratory rather than the wild.

On the positive side, Finnish security firm F-Secure said that 2004 was the best-ever year for the capture, arrest and sentencing of virus writers and criminally-minded hackers.

http://news.bbc.co.uk/1/hi/technology/4105007.stm

Read more

Phishing, spyware and other pests plagued 2004

Posted on December 30, 2004December 30, 2021 by admini

And while technology to combat such threats has improved, experts concede that’s not enough to address what’s bound to emerge in the coming year.

“The bottom line is, there is no silver bullet technology,” said Gregg Mastoras, senior security analyst at security vendor Sophos Inc. “I just don’t think users are educated enough when they are on machines and what they are doing with it.”

The past year saw more industry attention to security: Microsoft Corp. upgraded its flagship Windows XP operating system, closing many loopholes and turning on a built-in firewall to thwart attacks. America Online Inc. gave away free security tools, and computer makers began installing software to combat spyware.

Dozens of products and services were developed to attack “phishing” — e-mail pretending to be from trusted names such as Citibank or Paypal, but directing recipients to rogue sites.

But developers of malicious code have gotten better at automating their tools, as well as sharing information about vulnerabilities and techniques to exploit them through underground message boards and chat rooms, said Mark Rasch, chief security counsel for Solutionary Inc.

No longer are bragging rights the primary motive.

“It used to be cool to bring down sites, almost (like) graffiti for the 21st century,” said Arthur Coviello Jr., chief executive for RSA Security Inc. “Today’s worms and viruses are far more detailed, and specific attacks are directed at individuals and businesses for the purpose of economic, ill-gotten gains.”

Virus writers have found new ways to infiltrate computers and networks, bypassing the protections inspired by their earlier methods of attack.

For instance, with more network administrators blocking attachments to stop viruses from spreading via e-mail, hackers managed in June to covert popular Web sites into virus transmitters by taking advantage of known flaws with Microsoft products.

They’ve also used viruses like “Mydoom” to deposit programs that let them take over infected PCs — and then use them to relay spam or launch attacks on Web sites like Microsoft’s. Ninety percent of viruses in 2004 carried a “backdoor” mechanism, compared with less than half in 2003, said Alfred Huger of Symantec Corp.

And once they’ve commandeered such PCs, they form networks of “zombies.” Spammers buy access to these networks so they can send e-mail that appears to come from legitimate home computers, making them harder to tag as junk. “They are well organized on the black market,” said John Levine, co-author of “The Internet for Dummies.”

Much of the malicious code appears to originate in countries without adequate laws to prosecute, experts say. Meanwhile, law enforcement agencies and service providers are only beginning to establish guidelines for jointly chasing suspects who can move about with stealth in a medium that knows no borders.

Security experts rank phishing and spyware as the greatest threats for 2005, given how clever their developers have gotten in the past year. Unlike spam pitching relatively cheap products like Vioxx, phishing scams can quickly drain entire bank accounts of unsuspecting users. The number of rogue sites used for such scams grew sevenfold in just four months — to 1,518 in November, from 221 in July — according to Websense Inc

http://www.securityfocus.com/news/10215

Read more

EMC Raises Bar on Network Management

Posted on December 22, 2004December 30, 2021 by admini

Analysts say the move is in step with an industry trend where systems vendors acquire smaller management software vendor With these new components, companies like EMC (Quote, Chart), IBM (Quote, Chart), HP (Quote, Chart) and others hope to provide more insight into clients’ computing systems.

So what exactly is EMC getting from network management software maker Smarts?

Passmore said that while management systems from EMC and other vendors work well, the packages tend to ask the administrator to know too much. Passmore said that after anywhere from 15 minutes to 45 minutes of troubleshooting, a really smart administrator will have figured out that one of those things reported was what actually happened and the rest were symptoms of that actual problem. What’s missing in those existing management packages is the ability to filter and correlate all these events and get down to the root cause.

Passmore said EMC’s No. 1 objective is to take this technology and move it into the storage networking space to simplify the administration and management of storage networks.

http://www.internetnews.com/storage/article.php/3450991

Read more

Groups fight Internet wiretap push

Posted on December 22, 2004December 30, 2021 by admini

In comments filed with the FCC, advocates with the Center for Democracy and Technology argue the government hasn’t offered any evidence that law enforcement agencies face obstacles in conducting Internet wiretaps under current regulations — which obligate ISPs and other companies to cooperate with court-authorized surveillance, but do not force them to retrofit their networks with special surveillance gear, as the government is asking.

“In the absence of evidence of any problem, it is impossible for the Commission to act,” wrote CDT, representing a handful of technology companies, industry associations and advocacy groups, including the Computer and Communications Industry Association, Dialpad Communications, the Electronic Frontier Foundation, the Information Technology Association of America, and others.

At issue is the 1994 Communications Assistance for Law Enforcement Act (CALEA), a federal law that mandates surveillance backdoors in U.S. telephone networks, allowing the FBI to start listening in on a target’s phone line within minutes of receiving court approval.

At the same time the FCC ruled that “managed” Internet telephony providers like Vonage must also become wiretap friendly.

The FCC opened the matter to public comment, specifically seeking guidance on some implementation details, including the issue of how much time to allow service providers to wire their networks for spying.

But many of the flurry of comments that followed challenged the fundamentals of the FCC’s ruling, including the commission’s authority to expand CALEA to the Internet in the first place.

http://www.securityfocus.com/news/10192

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme