Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Author: admini

Ex-NetScreen CEO takes on new start-up

Posted on September 23, 2004December 30, 2021 by admini

The company, which has built a server device that runs several identity protocols at once, announced earlier this week that it has hired Robert Thomas, NetScreen’s former CEO, as its own chief executive.

While at NetScreen, Thomas grew the company from a development-stage start-up with 31 employees to a flourishing public company with 950 employees. He also helped bring the company to a successful initial public offering in 2001. In February 2004, he helped sell the company to Juniper Networks in a deal worth $4 billion. Now Thomas is looking to do it all over again. “I was very fortunate that we were successful at NetScreen,” he said. “I learned lots of lessons that I hope to apply here.”

Infoblox, founded in 1999, has developed a server device that allows companies to run several identity protocols such as DNS, DHCP, Radius and LDAP at once, instead of running them on separate platforms like most companies do today.

Thomas argued that the old approach adds complexity and expense to the network. These standard protocols, some of which have been around for nearly a decade, are used to help large companies and service providers apply security policies to their networks.

Domain Name Service, or DNS, is used in the public Internet and private intranets to translate names of host computers into IP addresses.
Dynamic Host Configuration Protocol, or DHCP, allows computers to get temporary or permanent IP addresses from central servers.
Remote Authentication Dial In User Service, or Radius, is the de facto standard for authenticating users accessing networks remotely.
And finally, Lightweight Directory Access Protocol, or LDAP, is the standard protocol for clients accessing directory servers.

These protocols have become even more important to networking, because companies are now using them as part of an end-to-end security architecture. For example, Cisco and Microsoft plan to use Radius in their architectures, allowing networking devices to check the health of end points before they connect to the network.

Thomas compared today’s identity server market to that of the security market before NetScreen came on the scene. Like the identity market, companies bought point products for every security function, such as firewalls and virtual private networks.

NetScreen was one of the first companies to introduce a product that allowed customers to buy a single device that offered several security functions. Over the past couple of years, sales of these products have risen considerably.

“It’s a natural product evolution in product development to collapse functionality onto a single device to make it easier and simpler to use,” Thomas said. Although he believes Infoblox has an excellent strategy and product, Thomas acknowledged that one can’t build a company hoping that it will simply be acquired.

http://news.com.com/Ex-NetScreen+CEO+takes+on+new+start-up/2100-1033_3-5379059.html?part=rss&tag=5379059&subj=news.1033.5

Read more

CEOs Stagnant on Security

Posted on September 23, 2004December 30, 2021 by admini

E&Y contacted 1,233 organizations representing 51 countries for its “Global Information Security Survey 2004,” a report meant to gauge enterprise perceptions of security. “Perhaps the remarkable thing is how little attitudes, practices, and actions have changed since 1993 — during a period when threats have increased significantly,” the report states.

The survey found that only 28 percent of global respondents noted “raising employee information security training or awareness” as a top 2004 initiative, despite the fact that a “lack of security awareness by users” was their top IT security obstacle.

Sixty-seven percent of the organizations surveyed view information security as being an important part of achieving their organizations’ overall business goals and objectives.

Employee misconduct involving information security was noted by 60 percent of respondents as being a high-level concern for organizations over the next 12 months. They were noted by 68 percent of respondents as being responsible for an unexpected or unscheduled outage of a critical business system.

In contrast to the incidents reported from those external threats, incidents originating from former or current employee misconduct were noted by only 24 percent of respondents.

In 2003, 21 percent said the spending would increase significantly while 40 percent said it would increase slightly.

Earlier this year, research firm IDC reported 59 percent of its survey base indicated that IT security spending would increase.

Company chiefs are aware of the threats of information security breaches posed by their employees, but are failing to safeguard their assets against insider attack. Keeping control of security will only get more difficult as organisations move toward increasingly decentralised business models through outsourcing and other external partnerships, Ernst & Young’s 2004 Information Security Survey warns.

“Companies can outsource their work, but they can’t outsource responsibility for its security,” Edwin Bennett, global director of Ernst & Young’s technology and security risk services, said.

“Fewer than one-third of those companies conduct a regular assessment of their IT providers to monitor compliance with information security policies – they are simply relying on trust.

Organisations have to demand higher levels of security from their business partners.”

The Ernst & Young survey found that organisations remain focused on external threats such as viruses, while internal threats are consistently under-emphasised. Companies will readily commit to technology purchases such as firewalls and virus protection, but are hesitant to assign priority to human capital. And that leads to “damage from insiders’ misconduct, omissions, oversights, or an organizational culture that violates existing standards”.

More than 70 per cent of the 1,233 organizations questioned by Ernst & Young failed to list training and raising employee awareness of information security issues as a top initiative.

That’s just not good enough, it says. “More could and should be done to transform the skills and awareness of their people, who often present the greatest opportunity for vulnerabilities – and convert them into its strongest layer of defence,” Ernst & Young’s Bennett concludes.

http://www.internetnews.com/stats/article.php/3412331
http://www.theregister.co.uk/2004/09/23/insider_risk/

Read more

Microsoft Changes Its Tune on Porting SP2 Fixes

Posted on September 23, 2004December 30, 2021 by admini

The decision: No SP2 fixes — not even ones like the SP2 pop-up blocker or the ActiveX-control blocker — will be offered for users of older versions of Windows and Internet Explorer (IE).

Microsoft never publicly committed to providing any of the SP2 fixes for users of older versions of Windows or Internet Explorer. But company officials privately told a select group of developers earlier this year of plans to port some of the IE-specific fixes to the version of IE 6 for Windows 2000 (Service Pack 5 update).

“Trying to retrofit older technologies (which were never designed with current environment in mind) with current advancements creates a set of challenges that make it difficult for customers to deploy and doesn’t provide a level of security that we feel confident in providing to our customers. Microsoft’s decision not to port SP2 fixes to Windows 2000, in particular, doesn’t sit well with Michael Cherry, senior analyst with the Kirkland, Wash.-based “Directions on Microsoft” research outfit.

Is it ‘no’ to improvements that could be part of Windows 2000 in a future SP before it leaves mainstream support?

http://www.microsoft-watch.com/article2/0,1995,1650707,00.asp

Read more

P-cube goes hunting for zombie PCs

Posted on September 22, 2004December 30, 2021 by admini

P-Cube’s IP service control platform allows service providers to identify subscribers, classify applications and offer differentiated service performance. The technology makes it easier for telcos to control and manage advanced IP services such as voice-over-IP, interactive gaming, video-on-demand, or P2P traffic. P-Cube has tweaked this technology to help fight one of the principal causes of spam. A new version of the Engage service application (Engage v2.1) of P-Cube’s Service Control Platform released this week provides ISPs with a tool for network-based detection and protection from spam zombie attacks.

Worms such as MyDoom and Bagle (and Trojans such as Phatbot) surrender the control of infected PCs to hackers. These expanding networks of compromised zombie machines (dubbed ‘botnets’ by the computer underground) can be used for spam distribution or as platforms for DDoS attacks. By using compromised machines – instead of open mail relays or unscrupulous hosts – spammers can bypass IP address blacklists. A great deal of spam (between 40 to 80 per cent depending who you ask) originates from spam zombies. The large number of attacking machines makes it difficult to identify the source of a spam zombie-based attack or to take corrective action in real time without causing massive disruption to network operations and legitimate users.

P-Cube claims to have licked this problem with technology that is both application and subscriber-aware. The approach allows service provider to identify spam zombie activity from a particular subscriber, block their email transmissions and redirect the infected subscriber to a site where the system can be purged of the zombie infection. Engage can perform these functions without introducing latency into the network, P-Cube claims.

The approach is similar to the detect, isolate and cleanse approach Cisco has taken with its Network Admission Control program. The scheme involves a combination of technology from Cisco and AV vendors to combat the spread of computer worms across corporate networks.

P-Cube’s service platform competes with products from companies such as Ellacoya Networks and Sandvine.

As the market evolves its likely that traffic management technology will be increasingly brought into play alongside conventional anti-spam filtering in combating the zombie menace.

http://www.theregister.co.uk/2004/09/22/p-cube_zombie_buster/

Read more

Toyota: Some security firms promise too much

Posted on September 22, 2004December 30, 2021 by admini

Richard Cross, the automaker’s information security officer, warned against misleading doublespeak and promises of universal cure-alls.

“There is a temptation to go searching for a panacea, but if you find yourself speaking to a vendor and it sounds as though you are being offered a panacea, then it’s time to change the conversation,” Cross told attendees at the Gartner IT Security Summit in London this week. He added that in his view, many companies intentionally mislead customers.

The remarks drew a variety of reactions.

Ian Schenkel, managing director of security company Sygate, agreed with Cross that there are no panaceas. But he added that if there are any IT directors who have fallen for a misleading approach, it is in part because they have not done their homework. “Some IT directors are looking for the holy grail,” he said, adding that some have a tendency to only hear what they want to hear. What IT directors want to hear is that I’m the medicine man here to cure all their ills, but that simply isn’t the case. Companies should always be looking at a layered solution, involving multiple vendors. To expect a single solution is unrealistic.”

Some vendors say the problem of overselling is less severe than it used to be. Simon Perry, vice president of security strategy at Computer Associates International, said: “Five years ago, it was certainly true that most antivirus vendors were talking things up, but a growing sense of maturity and responsibility in the industry has definitely seen this decline.” Perry warned that companies that do oversell are in danger of not being taken seriously and jeopardizing their business. He said that typically it is smaller companies attempting to gain recognition in a crowded marketplace that may make bolder claims.

Schenkel conceded that the 1990s weren’t great days for honesty within the industry, or for the image of the IT vendor overall, but he added that much of the current negative press addresses little more than the kind of marketing that is rife in any competitive industry. “There is always going to be an element of jostling, with companies claiming theirs is the best product on the market, but that is just the software industry,” he said. “The bottom line is that companies still have to back up their claims.”

David Guyatt, CEO at Clearswift, told Silicon.com he would support any industry initiative and codes of practice that would effectively expose any company making exaggerated claims.

http://news.com.com/Toyota%3A+Some+security+firms+promise+too+much/2100-7355_3-5377287.html?part=rss&tag=5377287&subj=news.7355.5

Read more

Microsoft releases VPN patch for SP2

Posted on September 22, 2004December 30, 2021 by admini

Microsoft has published the patch through its Web site. It fixes a problem that installing XP SP2 creates with VPNs and can be downloaded here.

Once installed, XP SP2 can cause users to see a ‘cannot establish a connection’ message if a the machine tries to connect to IP addresses in the loopback address range, according to Microsoft’s Web site.

However, Redmond won’t be expecting too many hits on the patch yet. XP SP2 has only reached a fifth of the people Microsoft had hoped, missing its target by 80 million. The patch is the second Microsoft has been prompted to offer following the emergence of XP SP2.

Microsoft’s CRM product also needed a fix to become compatible with the service pack.

The VPN fix is one of the downloads that features in a pilot programme to test if users’ licences are genuine.

To download the fix, users are required to have their licences validated through Microsoft’s website.

http://news.zdnet.co.uk/software/windows/0,39020396,39167556,00.htm

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme