MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
RootPrompt.org
June 5, 2000
Jeremey Barrett
A Response to the feature on IPv6 vs. SSL SSL and other transport-layer protocols provide additional and different security functionality that IPsec (and hence IPv6) will never provide.... mark for My Articles similar articles
RootPrompt.org
May 29, 2000
Reto Haeni
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). mark for My Articles similar articles
CAUSE/EFFECT
Vol 22 Num 4 1999
Kenneth J. Klingenstein
Middleware: The Second Layer of IT Infrastructure A second wave of network invention and deployment has begun. Riding on top of the physical Internet protocol (IP) connectivity that drove the first generation of networking, this effort adds "logical" connectivity to the networked infrastructure.... mark for My Articles similar articles
Linux Journal
February 1, 2007
Irfan Habib
Creating SELinux Policies Simplified SELinux does not have to be as hard to manage as many people may think. mark for My Articles similar articles
D-Lib
June 2006
Teets & Murray
Metasearch Authentication and Access Management The NISO Metasearch Initiative Task Group on Access Management makes suggestions to institutions in the process of acquiring new electronic resources to control access to their electronic resources and support metasearch. mark for My Articles similar articles
JavaWorld
May 2001
Raghavan N. Srinivas
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. mark for My Articles similar articles
PC Magazine
August 19, 2003
Simpler, Safe Remote Access Remote access via SSL (Secure Sockets Layer), the focus of our product roundup, is relatively new, but it's growing quickly because of its simplicity for users and its accessibility from any PC with an Internet connection and browser, anywhere. mark for My Articles similar articles
Macworld
October 25, 2005
Andrew T. Laurence
Timbuktu Pro 8.5 Worthy upgrade stresses security and encryption of network connections and has better Tiger compatibility. mark for My Articles similar articles
D-Lib
Jan/Feb 2010
Reilly & Tupelo-Schneck
Digital Object Repository Server: A Component of the Digital Object Architecture This paper introduces the Digital Object Repository Server, the most recent instantiation of the Corporation for National Research Initiatives' repository work. mark for My Articles similar articles
Financial Advisor
March 2012
Joel P. Bruckenstein
Secure Your Content SafeSync for Business provides a way to securely share and access your firm's data online. mark for My Articles similar articles
PC Magazine
July 8, 2010
Neil J. Rubenking
Defender F200 + Bio Protect your most sensitive data in transit by carrying it on the Imation Defender F200 + Bio secure USB drive. The bad guys won't break through its hardware-based AES encryption and biometric authentication. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
CRM
June 2015
Leonard Klie
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information mark for My Articles similar articles
Bank Systems & Technology
February 18, 2009
Ashfield & Shroyer
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. mark for My Articles similar articles
JavaWorld
March 2003
Frank Sommers
The first taste of Liberty The Liberty Alliance Project specifications provide a single sign-on mechanism for both Websites and Web services. This article explores how Liberty helps federate a user's identities from different service providers and uses that federated network identity to authenticate a user. mark for My Articles similar articles
JavaWorld
March 2003
Jian Zhong
From stove-piped projects to unified enterprise architecture A discussion of strategic considerations in developing an e-authentication service in enterprise environments, touching on e-authentication, e-signature, and an enterprise architecture (EA) approach for reusability and information sharing. mark for My Articles similar articles
InternetNews
February 28, 2005
Roy Mark
Feds Approve New Smart Card Standards Federal employees and government contractors will eventually be given cards with digital photos and fingerprints. mark for My Articles similar articles
Bank Technology News
March 2008
Rebecca Sausner
The FutureNow List The FutureNow List recognizes ten companies that set themselves apart for the security innovations they bring to market, and the contribution these products will make to improving security within financial services organizations. mark for My Articles similar articles
Military & Aerospace Electronics
December 2007
Courtney E. Howard
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. mark for My Articles similar articles
D-Lib
June 2001
John S. Erickson
A Digital Object Approach to Interoperable Rights Management Fine-grained policy enforcement enabled by a digital object infrastructure... mark for My Articles similar articles
Bank Technology News
April 2008
Andrew Rossetti
Security Requires a Team Effort Only by working together with business units can IT, in its role as data custodians, have a chance of securing data within our organizations. mark for My Articles similar articles
Bank Systems & Technology
August 24, 2006
Peggy Bresnick Kendler
Identity Management Addressing the biggest threats to information security for banks. mark for My Articles similar articles
Home Toys
April 2003
John Drabik
Creating an Effective VPN Implementation on Embedded Linux This article discusses issues and tradeoffs associated with implementation of IPsec on Virtual Private Network (VPN) gateways. mark for My Articles similar articles
InternetNews
June 5, 2006
Clint Boulton
Ping For Safer Log-ins Ping Identity, a standalone maker of secure single sign-on software for managing Web-based exchanges, improved its software platform for allowing businesses to securely complete transactions and share information. mark for My Articles similar articles
Linux Journal
July 2000
Wael A. Hassan
Book Review: Security Technologies for the World Wide Web by Rolf Oppliger This book explains the different aspects of the Web, from both the user point of view and system administrator or network architect. It has plenty of references, web sites and pointers to where information can be found. Very well-written... mark for My Articles similar articles
InternetNews
May 14, 2010
Facebook Adds Login Security Features Facebook rolls out a login notification service alerting users to activity on their accounts and begins asking verification questions when users log in from unfamiliar devices. mark for My Articles similar articles
Wall Street & Technology
March 21, 2006
Paul Allen
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. mark for My Articles similar articles
InternetNews
November 17, 2010
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
Scientific American
September 2006
Tom Leighton
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. mark for My Articles similar articles
T.H.E. Journal
August 2004
Ozkan & Gunay
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. mark for My Articles similar articles
Bank Systems & Technology
August 30, 2005
Maria Bruno-Britz
Maximum Security Although all industries are susceptible to data theft, the costs in terms of reputation and dollars are particularly steep in financial services, and most banks are taking measures to reduce the risks associated with handling consumer data. mark for My Articles similar articles
Wall Street & Technology
April 18, 2008
Melanie Rodier
Financial Institutions Evaluate Biometrics While financial institutions aren't yet ready for consumer-facing biometrics deployments, these technologies are gaining popularity for behind-the-scenes authentication. mark for My Articles similar articles
JavaWorld
August 2001
Todd Sundsted
Secure your Java apps from end to end, Part 3 A secure networked Java applications solution depends upon an understanding of the network environment, the skills of the application's users (and abusers), and the impact application and virtual machine flaws might have on security... mark for My Articles similar articles
Bank Systems & Technology
May 26, 2010
Matt Gunn
Fiserv, PhoneFactor Partner For Phone-Based Multi-Factor Authentication Authentication services provider PhoneFactor and Fiserv announced a partnership that makes phone-based multi-factor authentication available through Fiserv's Corillian Online banking solution. mark for My Articles similar articles
Wall Street & Technology
November 19, 2008
Melanie Rodier
Case Study: Loomis Sayles Implements Multifactor Authentication Loomis Sayles deploys the Imprivata OneSign Authentication Management solution, enabling authentication via password, fingerprint and token. mark for My Articles similar articles
PC Magazine
April 20, 2004
Larry J. Seltzer
Stopping Spam SMTP authentication can corral spam, but implementation is thorny. mark for My Articles similar articles
CIO
June 15, 2006
Thomas Wailgum
The Security Plan for Your Wireless LAN Take advantage of the latest security tools and keep your users informed if you want to achieve wire-free bliss. mark for My Articles similar articles
Bank Technology News
December 2008
Glen Fest
The Paradoxes Of Mobile Adoption A new Javelin Strategy & Research report reveals layers of paradox involving mobile banking security. mark for My Articles similar articles
Bank Systems & Technology
September 30, 2006
Maria Bruno-Britz
Zions, ING Pick RSA Risk-Based Authentication Solution Security solutions provider RSA saw its Adaptive Authentication solution implemented at Salt Lake City-based Zions Bank and ING Direct for the banks' online retail banking customers. mark for My Articles similar articles
T.H.E. Journal
August 2000
System Eases Wireless Networking Management Lucent's ORiNOCO version 6.0 software provides HP-OpenView network management and configuration tools, and adds RADIUS-based Media Access Control (MAC) authentication for the ORiNOCO high-speed wireless networking system.... mark for My Articles similar articles
InternetNews
February 14, 2006
Erin Joyce
IT to Endpoints: Who Are You? Security vendors say enterprises need to be a lot more picky about their network access protocols. mark for My Articles similar articles
T.H.E. Journal
June 2006
Doug Gale
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. mark for My Articles similar articles
Wall Street & Technology
November 18, 2005
Stronger Authentication Single-factor authentication is insufficient for online financial services, according to the Federal Financial Institutions Examination Council (FFIEC). mark for My Articles similar articles
InternetNews
May 14, 2004
Ryan Naraine
Risk Management, The Microsoft Way How do you secure the 'world's largest experimental computer network'? Redmond shares its risk-management security strategy. mark for My Articles similar articles
Bank Systems & Technology
October 30, 2007
Nancy Feig
Banks Using Mobile Phone for Out-of-Band Authentication Amid increasing pressure to protect customers online, some of the largest global banks are turning to out-of-band authentication to fortify their Web banking services. mark for My Articles similar articles
InternetNews
May 12, 2011
Object-Based Storage Debated at Interop The world of storage is undergoing a transformation with new object-based storage technology. mark for My Articles similar articles