Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Hidden gold in corporate cleanup

Posted on November 24, 2004December 30, 2021 by admini

Sarbanes-Oxley may strike dread in the hearts of some IT executives, but not Tracy Austin. Austin, the chief information officer with casino operator Mandalay Resort Group, said the financial reporting regulations act resulted in a 30 percent increase in her information technology budget this year and battle-tested her fairly young IT staff. “I was able to beef up our test and development system budget, as well as our firewall and intrusion detection system budget,” Austin said. “Sarbanes-Oxley opened up the awareness of our (chief) executives and prompted questions about…our business risks. So instead of talking about technology, we were talking about what are our business risks and the technology to address them.”

That’s because the regulations laid down in the Sarbanes-Oxley Act and other laws hold executives’ feet to the fire, making them responsible for signing off on the accuracy of their financial statements. Last week, a key section of Sarbanes-Oxley kicked in, turning up the heat. That push to overhaul systems looks likely to be a boon for security technology providers.

Overall spending on complying with the Sarbanes-Oxley Act is expected to reach $5.5 billion this year, according to a recent survey by AMR Research. That’s more than double the $2.5 billion that was spent last year.

And technology companies are expected to grab nearly a third of the multibillion-dollar spending pie in 2005. Companies are spending more on compliance in general, according to a PricewaterhouseCoopers survey released on Tuesday, which found that about half of U.S. and European businesses expect to increase those budgets by an average of 23 percent during the next year to two.

http://news.zdnet.com/Hidden+gold+in+corporate+cleanup/2100-1009_22-5465305.html?part=rss&tag=feed&subj=zdnn

Read more

Hot Technologies For 2005 On the Front Line

Posted on November 23, 2004December 30, 2021 by admini

In this year’s survey (detailed results will appear in VARBusiness’ Jan. 10, 2005, issue and online at www.varbusiness.com), VARs also named Voice over IP, 64-bit processors and radio-frequency identification (RFID) as areas they consider likely to constitute breakthrough technologies for their businesses in 2005.

In thw article, they provided some perspective behind those projections, with technology-based snapshots of these hot segments.

Blade Servers Bust Out Spurred by the advent of new 64-bit microprocessor technologies and the enthusiastic uptake of Linux, VARs don’t find many areas where they move more units than in blade servers. The market is growing at a torrid pace — blade revenues for this year’s second quarter total $233 million, according to IDC, for an annual run-rate of nearly $1 billion. So it’s not unexpected that Tier 1 vendors IBM, Hewlett-Packard and Sun Microsystems are stoking their respective channels with hot products aplenty as they fight a pitched battle for the blade high ground.

With its BladeCenter lineup, IBM is successfully working a dual-processor strategy. Some of the models, like the JS20, sport IBM’s homegrown Power architecture.

For its part, HP is thinking beyond the server box when it comes to its BladeSystem family, pitching it as a total “infrastructure” solution that uses tools such as HP’s Systems Insight Manager software to create a virtualized network.

Resellers would do well to study HP’s tack, since marketing mere blades doesn’t seem nearly as savvy as selling full-fledged utility computing solutions.

And though it is a ways back from IBM and HP, Sun, nevertheless, is going full-speed ahead in blades. Its Sun Fire B100x and B1660 blade platforms give VARs the flexibility of offering customers a mix-and-match assortment of Sparc and x86 processing power, and Solaris and Linux operating systems control.

There’s Something About 64 Bits What’s bigger than a desktop PC but not quite as hefty as those expensive RISC-processor-based boxes that are replacing yesteryear’s mainframes?

Unit sales of commodity servers based on AMD’s high-flying Opteron processors soared 81 percent in the second quarter of 2004, IDC says. Its a hybrid 32-/64-bit CPU, which can run both 32- and 64-bit software via a set of 64-bit instruction-set extensions.

AMD kicked off the category in 2003 with its AMD64 architecture and companion 64-bit instruction-set extensions. These are implemented in AMD’s Opteron server (and companion Athlon 64-bit desktop) processors.

IBM, HP and Sun have all rolled out Opteron servers, as have numerous white-box builders.

Seething on the sidelines as AMD’s technology was rapidly adopted by the market, Intel fired back this summer with its own extensions, called EM64T, and a 64-bit version (formerly code-named Nocona) of its tried-and-true Xeon server CPU. The 64-bit Xeon should stoke additional volume deployments of commodity servers in 2005, IDC says.

Looking ahead, next year will see products push ahead in the form of multicore processors from both Intel and AMD.

Above commodity platforms, at the high end of the market, IBM and Sun are both fielding 64-bit processors. The Power 5, which was publicly unveiled in March, is IBM’s latest iteration of its RISC microprocessor architecture. for Sun, it’s producing a dual-core UltraSparc IV chip, while it paves a path to the 2006 launch of its groundbreaking eight-core Niagara processor.

As for Intel’s high-end play, the Itanium 2, the company has already demonstrated the next-generation version of that processor. Code-named Montecito, it has a multicore design and more than 1.7 billion transistors.

Linux Becomes Likeable No longer the little OS that could, Linux is making a big play to take its place in the center of the enterprise. Although Microsoft has thrust its Windows Server offering into that same space — and is spending $1.7 billion annually in support of its channel partners to make sure it maintains its leadership position — Linux in the enterprise is still moving forward, slowly but surely. Both Red Hat and Novell’s SuSE operation have rolled out enterprise-class versions of their Linux distributions.

Sales of Red Hat Enterprise Linux have reached 144,000 units, including 115,000 subscriptions to enterprise IT servers.

Meanwhile, sales of subscriptions to SuSE Linux Enterprise Server reached 19,000 units in Novell’s recently completed third fiscal quarter.

To help spur deployment, the two vendors are also pursuing reseller programs, albeit with different flavors.

Red Hat, which has rubbed some VARs the wrong way with the perception that it’s out to write as much business for itself as it can, has a list of partners for its Enterprise Linux family, though they skew toward larger OEMs and ISVs, such as BEA, HP, IBM and Veritas.

SuSE had a fairly small partner program when it was acquired by Novell in late 2003. Novell has spent the past year working to fold SuSE into its much larger channel operation.

Boding well for both companies is the fact that vendors such as HP, IBM and Oracle tend to remain Linux-agnostic and support both Red Hat and SuSE according to their customers’ wishes.

Moving ahead on the technology front, watch for Linux to get ever more capable, given the recent addition of support for scalable, high-end servers made possible by the new 2.6 kernel.

Security also will command increased attention, as the kernel enables Linux purveyors to make their distributions compliant with the emerging EAL 4 international standard.

At the same time, security software is expanding to protect against identity theft and proactively assess and stop hacker attacks before they breach the network edge. Computer Associates, for one, has extended its eTrust Security Management software line to encompass such solutions.

VoIP has moved to a new level of reliability that relegates to the past nasty dropouts and other glitches surrounding the digital data packets used to carry voice traffic over the Internet. And, as a $2 billion annual business, it’s finally becoming a field with profit potential.

The most capable of today’s storage systems deliver cutting-edge virtualization capabilities to create separate pools of storage for different application profiles. Logical partitioning and simplified replication features deliver streamlined storage management and optimized application performance.

http://www.securitypipeline.com/news/54200445;jsessionid=BGYJHLBB25A4IQSNDBCCKH0CJUMEKJVN

Read more

Banks look to trial web toolbars to counter phishing e-mail attacks

Posted on November 23, 2004December 30, 2021 by admini

The UK payments association Apacs said banks were investigating the technology as one of a range of countermeasures to tackle the epidemic of phishing.

The disclosure follows an attack on NatWest, which forced the bank last week to suspend the ability to make third-party payments for more than two days affecting one million customers.

Tom Salmond, manager of the e-banking working group at Apacs, said the anti-phishing toolbars had been introduced by sites such as eBay and that the same technology could help bank customers.

Banks are beginning to personalise the e-mails they send to customers by including their names and an agreed code-phrase to help customers to identify genuine e-mails from their bank.

In the longer term, the industry is looking to use two-factor authentication to verify customers’ identities.

Barclaycard is trialling a system that uses low-cost card-readers to generate pass-codes from bank cards.

Interim solutions under investigation include proposals to send SMS messages to customers to confirm transactions, and the introduction of pads of one-time user passwords.

A small number of banks have introduced software to detect suspicious transactions generated by phishing attacks, and this is likely to be taken up more widely, Salmond said.

“This kind of solution will be increasingly adopted in the next six- to nine months,” he said.

Banks are also signing up to services which monitor the internet to detect websites which may be attempting to mimic real banking websites, and provide early warnings of the launch of new phishing attacks.

Apacs plans to launch a publicity campaign to alert the public to the dangers of acting as “money mules” for phishing gangs, over coming weeks.

http://www.computerweekly.com/articles/article.asp?liArticleID=135252&liArti%20cleTypeID=1&liCategoryID=6&liChannelID=22&liFlavourID=1&sSearch=&nPage=1#

Read more

Hacker Exploit Spreads Virus Through Banner Ads

Posted on November 22, 2004December 30, 2021 by admini

The malware exploited a vulerability in Internet Explorer that was announced earlier this month; Microsoft says a fix is more than two weeks away.

Hackers used banner ads to launch a widespread attack in Europe over the weekend. The hackers apparently broke into a that delivers banner ads for Germany’s Falk eSolutions and loaded malicious code on banner advertising that appeared on hundreds of Web sites. “Early Saturday morning an unauthorized individual exploited a weakness in a load balancer on the European AdSolution network.” The purpose of the exploit was to establish a redirect to malicious code through a javascript component of Falk’s ad delivery.

The malware exploits the Bofra/IFRAME vulnerability in Internet Explorer, which was announced earlier this month. Systems that have been upgraded to Windows XP Service Pack 2 reportedly are not affected.

“In total, potential redirects to this exploit code represented less then 2 percent of EU ad requests and under 0.1 percent of U.S. ad requests during this time period,” Falk eSolutions says in a notice on its site.

GMT, the virus was removed from all Falk European and U.S. networks, and normal ad delivery was restored,” the company says.

http://enterprise-security-today.newsfactor.com/story.xhtml?story_title=Hacker-Exploit-Spreads-Virus-Through-Banner-Ads&story_id=28597&category=intrusion

Read more

Tech leaders see the CFO’s role growing

Posted on November 19, 2004December 30, 2021 by admini

Among the business leaders taking the stage were George Reyes, chief financial officer of Web search giant Google, and James Goodnight, chief executive of SAS. Along with experts such as Blythe McGarvie, president of consulting group Leadership for International Finance, and Angelo Messina, CFO of manufacturing giant Carrier, the business leaders outlined the challenges of being a top-ranking finance executive.

Predictably, the issues most frequently touched on were related to the glut of accounting scandals unearthed at companies such as Enron over the past several years, and the daunting task of meeting the guidelines set forth in the Sarbanes-Oxley Act, the legislation crafted in the wake of those scandals to protect against corporate fraud.

Reyes noted the importance of establishing better protective measures but said Google’s efforts to comply with Section 404 of Sarbanes-Oxley have become increasingly expensive. The 404 guideline, which took effect earlier this month, demands that publicly traded companies have policies and controls in place to secure, document and process material information dealing with their financial results.

“It’s always true that a smart bad guy can extract what they need (to commit fraud), but I have real concerns over the rising costs” of Sarbanes-Oxley, Reyes said. “We’ve seen (Section) 404 certification fees triple, and with a scarcity of resources on the market, people are taking advantage.” Reyes said one benefit of working to meet the requirements of Sarbanes-Oxley has been the opportunity to employ new accounting process measures that benefit the company as a whole, not just in meeting the regulatory legislation’s terms. While he believes that costs related to addressing Sarbanes-Oxley remain “out of whack,” Reyes said he hopes activity in the sector will cool down over the next two years.

Goodnight, who offered a colorful illustration of how some companies may actually be able to save money by purchasing their own airplanes, as he says SAS has, focused on the growing need for chief executives to nurture close relationships with their CFOs.

The SAS executive said that in addition to “keeping their CEOs out of jail,” chief financial officers must become more involved in corporate strategy, not just smarter bookkeeping. “The relationship needs to be more collaborative than it ever was in the past,” Goodnight said. With the accounting fallout bringing corporate governance to the forefront, that adds a need for additional levels of trust and mutual dependency between CEOs and CFOs.”

The executive referred to the CFO as the chief executive’s “ideal confidant,” someone who needs to look beyond the numbers on a company’s balance sheet to help understand where a business needs to go in order to improve its prospects. “CEOs need to include their CFO as a trusted partner to balance internal and external factors and transform their role from providing transparency to creating a better corporate vision,” Goodnight said.

Among the other issues addressed by Google’s Reyes were the search company’s initial public offering, in August 2004. The CFO called the stock offering the “critical defining moment” for Google, and he admitted that challenges such as the publishing of a controversial executive interview in Playboy magazine made the event all the more harrying. “In some ways, we didn’t perform as well as possible, as with the Playboy article, which was a self-inflicted wound,” Reyes said. “But, as our board of directors and investors look back, we couldn’t be happier with the outcome, as the stock is performing well.”

Reyes also detailed his role in promoting Google’s human resources efforts, including the company’s strategy of keeping employees on campus by offering on-site benefits such as gyms, masseuses and an abundant cafeteria. The executive even broached the topic of the corporate expensing of stock options, a concept that has ruffled feathers throughout the IT industry, based on the belief that the practice will discourage companies from offering the incentives to employees. “Equity and stock options have been at the heart of (Silicon Valley’s) attraction,” he said.

“But there’s a new sheriff in town, and he’s beating the drum this year.

http://news.zdnet.com/2100-3513_22-5460352.html?part=rss&tag=feed&subj=zdnet

Read more

ITU Virtual Conference on Countering Spam

Posted on November 19, 2004December 30, 2021 by admini

http://www.itu.int/osg/spu/newslog/2004/11/22.html#a761

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme