HomeCybersecurity

Cybersecurity

Biometrics Is Closing in on the Enterprise

Biometric security vendors, which for years have been trying to make the leap from science fiction to the enterprise, may soon reach their goal.Banks,...

Return to Exodus

We first visited one of Exodus Communications co-location facilities back in April 2000. Back then, we uncovered several potential security concerns. Now were back...

IE 6.0 Beta Takes Small Steps

Microsoft Corp.s Internet Explorer 5.0 was released in March 1999. Now, with the release of the beta of IE 6.0 two years later, its...

A Privacy Assessment Tool Offers One Answer

The online-privacy game has many rules, but few ways to keep score.Fiderus Corp., a privacy consulting firm based in Cary, N.C., seeks to address...

Surviving in an Insecure E-World

As if we needed another one, the vulnerabilities recently found in the widely used Berkeley Internet Name Domain server (see www.cert.org/summaries/CS-2001-01.html) should serve as...

Plugging Holes

A spate of recent computer attacks indicates that software fixes distributed after the fact cannot make the Internet safe, and are themselves too numerous...

Corporate Privacy: Disunited Front

Even as corporate foes of federal privacy regulation champion the release of new data detailing the lofty cost of such rules to businesses and...

Products Block Hacker Attacks When ISPs Use Them

Denial-of-service attacks, typically launched by malicious hackers from commandeered servers, can be stopped with security products that can detect and block outgoing attacks, security...

Exchange SP 1: More Secure, Scalable

An upcoming service pack for Microsoft Corp.s Exchange Server 2000 will offer corporate IT managers new scalability and security features.The added functionality in Exchange...

Securant Adds Control to Security

Securant Technologies Inc. is looking to take some of the heat off overworked security administrators with the launch this week of its Enterprise Transparency...