Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

EMC acquires server specialist VMware

Posted on December 15, 2003December 30, 2021 by admini

The move will help EMC reach further into the world of utility computing, a trend sweeping the industry as companies search for ways to make information technology easier to manage and more efficiently used, the Hopkinton, Mass.-based company said. Today, EMC is accelerating the convergence of these two worlds,” he said in a statement.

The acquisition indicates that EMC, which already has a major presence in large corporations, is trying to expand into the same advanced systems management area targeted by IBM, HP, Sun Microsystems, Microsoft and others.

VMware’s software lets a single server run multiple operating systems simultaneously on different “virtual machines,” a technology well developed in expensive mainframe computers, maturing in Unix servers, and now arriving in lower-priced machines based on Intel processors.

IBM’s and HP’s comfort working with a neutral start-up may not carry over to EMC, a competitor in the storage domain, Haff said.

More info: [url=http://zdnet.com.com/2100-1104_2-5124506.html]http://zdnet.com.com/2100-1104_2-5124506.html[/url]

Read more

Financial Security info center gets $2 million

Posted on December 14, 2003December 30, 2021 by admini

The center is one of many that industries and their government liaisons formed since 1998 to share vulnerability information and alerts when incidents occur that affect critical infrastructure, such as telecommunications and banking.

Money from Treasury will allow the center to expand to serve the entire financial industry, department officials said. By the end of fiscal 2005, officials expect that the center will be funded entirely by membership fees, which range from $750 to $50,000 per year. Upgrades include:
* Enhancing the network so it can serve more than 30,000 institutions.
* A secure forum for real-time information sharing.
* Physical data threats to the cyberthreat information.
* Web-based warnings and alerts service
* Setting more than 16 performance metrics
More info: [url=http://www.fcw.com/fcw/articles/2003/1208/web-fsisac-12-10-03.asp]http://www.fcw.com/fcw/articles/2003/1208/web-fsisac-12-10-03.asp[/url]

Read more

How the Internet Gives Consumers the Upper Hand

Posted on December 14, 2003December 30, 2021 by admini

Moreover, key decision makers and stakeholders—competitors, government agencies, the media, attorneys, current and former employees, and suppliers—are increasingly listening and referring to these online discussion communities for real-time insights.

Today, nearly 75% of consumers cite word-of-mouth recommendations as the most influential factor in their car-buying . In the space of a few short years, the Internet has evolved into a useful medium for particular kinds of commerce. After the dot-com hype of the 1990s, several car-buying Web sites emerged as some of the most popular of all Web destinations for consumers.

In addition to these quasi-official sites for information and opinions about vehicles, a parallel universe of Internet communities also sprang up where consumers freely shared information and informal opinions about all phases of the automotive experience—new-car attributes and drawbacks, subjective accounts about ownership, comparisons of competing vehicles, anticipation about new models, safety issues, product recalls, service problems, launch glitches and hassles with dealers.

These online communities, populated almost exclusively by consumers who love to talk about their cars, trucks and SUVs, have become an increasingly legitimate, albeit unstructured, source of car-related information in the eyes of all potential consumers.

Quite inevitably, this vast new storehouse of highly believable, unsolicited, unstructured information has begun to exercise huge infl uence on consumers’ behavior.

Left unmonitored and unchecked, these free-form and unstructured Internet discussions can both boost and harm automotive companies’ brand images, loyalty and satisfaction levels, product-quality perceptions, sales and profi ts.

As this paper will explore, these influential consumers, and the consumers and stakeholders they infl uence, are directly affecting the bottom lines of automotive manufacturers and dealers.

Of consumers who purchased a 2001 or 2002 vehicle, nearly 20% participated in online discussion groups before buying (Source: JD Power & Associates).

Consumers continue to rely on car companies and the automotive media for updated product information, auto reviews and new-model information, but more and more of them are looking to the Internet to narrow their choices and evaluate their options.

More info: [url=http://www.feedbackasp.com/whitepaper]http://www.feedbackasp.com/whitepaper[/url]

Read more

Changes to Functionality in Microsoft Windows XP Service Pack 2 Improve Security

Posted on December 12, 2003December 30, 2021 by admini

The technologies include:

Read more

Financial firms to increase investment in compliance

Posted on December 12, 2003December 30, 2021 by admini

The survey – conducted among 41 financial institution representatives at a Sun client conference organised by Finextra sister company 660 Degrees – found that 83% of respondents believe investment in compliance technology will be higher in 2004 than in 2003.

Of those surveyed, 64% cite compliance with legislation such as Basel II and Sarbanes-Oxley as ‘very important’ and 26% as ‘important’. Over half (55%) of firms describe compliance as a “distraction” from their core business in 2004 as they take steps to meet legal requirements.

Under Basel II, banks will be required to set aside capital to cover contingencies relating to operational risk. The final rules, which come into effect in 2007, will require banks to have collected and aggregated three years’ worth of data in order to effectively monitor and analyse risk under internal programmes.

Sarbanes-Oxley legislation requires chairpersons and chief financial officers to submit documents attesting to the accuracy and soundness of financial reports.

Martin Brown, UK head of finance, Sun Microsystems, says because of this regulation, sophisticated data mining tools, archival and retrieval systems and security software are now top of many firm’s priority lists. “2004 will be a defining year for regulation in the financial services industry. Not only is Sarbanes-Oxley coming into force, but in order to meet Basel II in 2007 financial institutions need to put the building blocks in place now,” he adds. Brown says that the Basel II and Sarbanes-Oxley are encouraging good business practice: “A firm should know what its exposure is and be able to base decisions on a complete set of historical data.”

More info: [url=http://www.finextra.com/fullstory.asp?id=10795]http://www.finextra.com/fullstory.asp?id=10795[/url]

Read more

Windows 98 Presents Security Problems As It Ends Lifespan

Posted on December 11, 2003December 30, 2021 by admini

The research paper and an accompanying survey, both released by AssetMetrix Research Labs, an arm of IT asset management vendor AssetMetrix, points out that although there are large numbers of machines in enterprises still running Windows 98, the Redmond, Wash.-based developer is set to retire the operating system and will stop posting security fixes for the OS in mid-January 2004.

AssetMetrix’s survey of 670 companies found that 80 percent of the firms were still running at least one machine with Windows 98 and the older OS, Windows 95. Together, the two operating systems account for over 27 percent of all installed Windows machines, a number substantially higher than the meager seven percent share of Windows XP.

As of January 16, 2004, Microsoft will shift Windows 98 into what it dubs the ‘non-supported phase,’ which means that although online help for the operating system will continue, the company is not obligated to release security ‘hotfixes’ for uncovered vulnerabilities. To compound the issue, Microsoft earlier this week announced that it was discontinuing distribution for all editions of Windows 98 except for Windows 98 Second Edition, a move required by a settlement reached with Sun Microsystems in a dispute over Java.

“But the largest potential risk to corporations using Windows 95 and 98 is the probability of an Internet-based security exploit being discovered after January that can affect a Win9X PC,” said AssetMetrix’s report. Among his other recommendations: make sure that all PCs, regardless of the operating system, have the latest security fixes from Microsoft installed, inventory the enterprise’s PCs to determine how many are running Windows 95 and 98, and obtain installation images prior to December 23, when Microsoft will stop the distribution of most flavors of Windows 98.

More info: [url=http://www.techweb.com/wire/story/TWB20031211S0009]http://www.techweb.com/wire/story/TWB20031211S0009[/url]

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme