Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Server lockdown locks out end users

    Posted April 25, 2001 - 1:27 pm

    What to do when your firewall is too effective.
  • Former Cisco VP could face money laundering charges

    Posted April 25, 2001 - 11:07 am

    BOSTON -- A U.S. Federal Bureau of Investigation (FBI) spokesman said Tuesday that there "was a very real possibility" that former Cisco Systems Inc. vice president Robert S. Gordon would be charged with money laundering following his surrender and arrest Monday on charges of wire fraud for embezzling and misappropriating stock owned by Cisco.
  • How Hackers Hack

    Posted April 25, 2001 - 10:00 am

    With the click of a mouse on one computer, the screen of the laptop a few feet away flashes wildly as a flood of data flies silently across a private network cable connecting the two machines. Within a minute the laptop's file sharing password is compromised
  • Connecticut teen charged with hacking into Air Force computer system

    Posted April 24, 2001 - 12:48 pm

    A Connecticut teenager faces charges of hacking into a government computer system that tracks the positions of U.S. Air Force planes worldwide.
  • U.S.-China incident underscores IT security's importance

    Posted April 23, 2001 - 11:56 am

    The global economy depends on IT security. If security measures don't evolve to meet ever-changing threats, the prospects for the future look bleak. Unfortunately, many companies don't get really serious about security until they get burned.
  • Letters to the editor

    Posted April 20, 2001 - 2:56 pm

    Firewall views
  • Okena fields software to prevent file tampering

    Posted April 20, 2001 - 2:45 pm

    Security start-up Okena last week made its debut with Windows NT-based software to protect against a wide variety of threats, including file tampering or denial-of-service attacks on Microsoft's Internet Information Server Web server, SQL Server database and Office and Outlook desktops.
  • Analysis: New security initiative raises concerns about duplication

    Posted April 20, 2001 - 1:25 pm

    A fee-based security information service announced yesterday by the Internet Security Alliance prompted some analysts to question whether the new effort will duplicate other programs that have already been set up.
  • Shark Tank: A little TOO random

    Posted April 19, 2001 - 4:47 pm

    Pilot fish subscribes to an online business newsletter and receives a computer-generated password. She objects to it and tries to change it. No can do. She tries to get the system to generate a different password. No luck. And without using the password, she can't read the newsletter.
  • CERT will sell early security warnings to business

    Posted April 19, 2001 - 1:39 pm

    The CERT Coordination Center, a government-funded Internet security group, will offer a 45-day advance security notice service, previously reserved for government agencies, to private sector companies.
  • Wanted: PKI interoperability

    Posted April 19, 2001 - 12:02 pm

    Server-based certificates are in wide use on the Web to verify that servers are truly what they claim to be. But adoption of digital certificates by organizations for widespread e-commerce use remains clouded for several reasons, including a lack of interoperability among vendors' public-key infrastructure (PKI) offerings.
  • Don't Turn a Deaf Ear to the Rise of Wireless Devices

    Posted April 18, 2001 - 4:42 pm

    Like the PC revolution in the mid-1980s, not all IT managers are eager to embrace the rise of wireless devices. But if you resist, you do so at your peril.
  • 'Matcher' virus fails to spread the love

    Posted April 18, 2001 - 3:06 pm

    Security firm Trend Micro identified a new Microsoft Visual Basic Script Trojan horse virus called "Matcher" early Wednesday morning in Europe and the U.S.
  • Vendors use packed RSA show to launch products

    Posted April 18, 2001 - 2:18 pm

    Security vendors launched new products at the RSA Conference, which was attended by thousands of security professionals, international security consultants and vendors.
  • RSA Conference: Hackers, threats and security concerns dominate

    Posted April 18, 2001 - 10:29 am

    A year filled with hacker attacks, flawed IT security and increasing threats -- even by novices -- underscores interest in this year's RSA security conference.
  • Information as battlespace

    Posted April 17, 2001 - 3:03 pm

    At the last National Information Systems Security Conference, Lt. General Michael Hayden, director of the National Security Agency and chief of the Central Security Service, made some interesting and thought-provoking remarks in a keynote address.
  • Stopping spiders and hackers

    Posted April 17, 2001 - 2:44 pm

    Editor?s Note: We?d like to apologize for the duplicate newsletters that many of you received last week. The problem was tracked to a technical glitch that we have been told has now been fixed - so it shouldn?t happen again. Thank you for your patience!
  • It's a bad, bad, bad, bad world

    Posted April 17, 2001 - 11:30 am

    New security services and tools try to intercept online villains
  • Break the Code

    Posted April 17, 2001 - 10:51 am

  • Antivirus Safety Net Has Too Many Holes

    Posted April 17, 2001 - 10:20 am

    One manager's methods of keeping up in a world seething with viruses.
  • New Tools Address Denial-of-Service Threat

    Posted April 16, 2001 - 4:29 pm

    Concerns about denial-of-service attacks are resulting in a growing number of products and services aimed at helping companies detect, trace and block the threat. But most of the technologies do little to prevent such attacks outright, users said.
  • Changing face of security

    Posted April 16, 2001 - 2:35 pm

    The need to accommodate more complex business transactions over networks is changing the future of information security models, shifting away from those that defensively fortify the enterprise in favor of those that push business processes and transactions beyond local network infrastructure.
  • Getting past the DMZ

    Posted April 16, 2001 - 11:00 am

    At our ISP, part of our network has a firewall with three Ethernet cards connected to separate networks: the internal network, the DMZ (demilitarized zone) and the outside network. The primary DNS server and mail server are in the DMZ. The secondary DNS server is connected to the outside network. We have a client who wants to set up Internet mail. We gave him a local IP address and put all the entries in our DNS server, but we can only ping the mail server on the inside network and can't do it on the outside.

  • Part way down a slippery slope

    Posted April 16, 2001 - 10:54 am

    It's long been rumored that some governments have sponsored research programs in cyberterrorism with the aim to disrupt networks and network-based services of enemies.
  • Companies warming up to PKI

    Posted April 16, 2001 - 10:23 am

    Although public-key digital certificate systems remain expensive and hard to deploy, last week's RSA Security conference provided ample evidence the technology is winning over organizations.

Join today!

See more content
Ask a Question