Similar Articles |
|
RootPrompt.org June 5, 2000 Jeremey Barrett |
A Response to the feature on IPv6 vs. SSL SSL and other transport-layer protocols provide additional and different security functionality that IPsec (and hence IPv6) will never provide.... |
RootPrompt.org May 29, 2000 Reto Haeni |
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). |
CAUSE/EFFECT Vol 22 Num 4 1999 Kenneth J. Klingenstein |
Middleware: The Second Layer of IT Infrastructure A second wave of network invention and deployment has begun. Riding on top of the physical Internet protocol (IP) connectivity that drove the first generation of networking, this effort adds "logical" connectivity to the networked infrastructure.... |
Linux Journal February 1, 2007 Irfan Habib |
Creating SELinux Policies Simplified SELinux does not have to be as hard to manage as many people may think. |
D-Lib June 2006 Teets & Murray |
Metasearch Authentication and Access Management The NISO Metasearch Initiative Task Group on Access Management makes suggestions to institutions in the process of acquiring new electronic resources to control access to their electronic resources and support metasearch. |
JavaWorld May 2001 Raghavan N. Srinivas |
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. |
PC Magazine August 19, 2003 |
Simpler, Safe Remote Access Remote access via SSL (Secure Sockets Layer), the focus of our product roundup, is relatively new, but it's growing quickly because of its simplicity for users and its accessibility from any PC with an Internet connection and browser, anywhere. |
Macworld October 25, 2005 Andrew T. Laurence |
Timbuktu Pro 8.5 Worthy upgrade stresses security and encryption of network connections and has better Tiger compatibility. |
D-Lib Jan/Feb 2010 Reilly & Tupelo-Schneck |
Digital Object Repository Server: A Component of the Digital Object Architecture This paper introduces the Digital Object Repository Server, the most recent instantiation of the Corporation for National Research Initiatives' repository work. |
Financial Advisor March 2012 Joel P. Bruckenstein |
Secure Your Content SafeSync for Business provides a way to securely share and access your firm's data online. |
PC Magazine July 8, 2010 Neil J. Rubenking |
Defender F200 + Bio Protect your most sensitive data in transit by carrying it on the Imation Defender F200 + Bio secure USB drive. The bad guys won't break through its hardware-based AES encryption and biometric authentication. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
CRM June 2015 Leonard Klie |
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information |
Bank Systems & Technology February 18, 2009 Ashfield & Shroyer |
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. |
JavaWorld March 2003 Frank Sommers |
The first taste of Liberty The Liberty Alliance Project specifications provide a single sign-on mechanism for both Websites and Web services. This article explores how Liberty helps federate a user's identities from different service providers and uses that federated network identity to authenticate a user. |
JavaWorld March 2003 Jian Zhong |
From stove-piped projects to unified enterprise architecture A discussion of strategic considerations in developing an e-authentication service in enterprise environments, touching on e-authentication, e-signature, and an enterprise architecture (EA) approach for reusability and information sharing. |
InternetNews February 28, 2005 Roy Mark |
Feds Approve New Smart Card Standards Federal employees and government contractors will eventually be given cards with digital photos and fingerprints. |
Bank Technology News March 2008 Rebecca Sausner |
The FutureNow List The FutureNow List recognizes ten companies that set themselves apart for the security innovations they bring to market, and the contribution these products will make to improving security within financial services organizations. |
Military & Aerospace Electronics December 2007 Courtney E. Howard |
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. |
D-Lib June 2001 John S. Erickson |
A Digital Object Approach to Interoperable Rights Management Fine-grained policy enforcement enabled by a digital object infrastructure... |
Bank Technology News April 2008 Andrew Rossetti |
Security Requires a Team Effort Only by working together with business units can IT, in its role as data custodians, have a chance of securing data within our organizations. |
Bank Systems & Technology August 24, 2006 Peggy Bresnick Kendler |
Identity Management Addressing the biggest threats to information security for banks. |
Home Toys April 2003 John Drabik |
Creating an Effective VPN Implementation on Embedded Linux This article discusses issues and tradeoffs associated with implementation of IPsec on Virtual Private Network (VPN) gateways. |
InternetNews June 5, 2006 Clint Boulton |
Ping For Safer Log-ins Ping Identity, a standalone maker of secure single sign-on software for managing Web-based exchanges, improved its software platform for allowing businesses to securely complete transactions and share information. |
Linux Journal July 2000 Wael A. Hassan |
Book Review: Security Technologies for the World Wide Web by Rolf Oppliger This book explains the different aspects of the Web, from both the user point of view and system administrator or network architect. It has plenty of references, web sites and pointers to where information can be found. Very well-written... |
InternetNews May 14, 2010 |
Facebook Adds Login Security Features Facebook rolls out a login notification service alerting users to activity on their accounts and begins asking verification questions when users log in from unfamiliar devices. |
Wall Street & Technology March 21, 2006 Paul Allen |
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. |
InternetNews November 17, 2010 |
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
Scientific American September 2006 Tom Leighton |
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. |
T.H.E. Journal August 2004 Ozkan & Gunay |
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. |
Bank Systems & Technology August 30, 2005 Maria Bruno-Britz |
Maximum Security Although all industries are susceptible to data theft, the costs in terms of reputation and dollars are particularly steep in financial services, and most banks are taking measures to reduce the risks associated with handling consumer data. |
Wall Street & Technology April 18, 2008 Melanie Rodier |
Financial Institutions Evaluate Biometrics While financial institutions aren't yet ready for consumer-facing biometrics deployments, these technologies are gaining popularity for behind-the-scenes authentication. |
JavaWorld August 2001 Todd Sundsted |
Secure your Java apps from end to end, Part 3 A secure networked Java applications solution depends upon an understanding of the network environment, the skills of the application's users (and abusers), and the impact application and virtual machine flaws might have on security... |
Bank Systems & Technology May 26, 2010 Matt Gunn |
Fiserv, PhoneFactor Partner For Phone-Based Multi-Factor Authentication Authentication services provider PhoneFactor and Fiserv announced a partnership that makes phone-based multi-factor authentication available through Fiserv's Corillian Online banking solution. |
Wall Street & Technology November 19, 2008 Melanie Rodier |
Case Study: Loomis Sayles Implements Multifactor Authentication Loomis Sayles deploys the Imprivata OneSign Authentication Management solution, enabling authentication via password, fingerprint and token. |
PC Magazine April 20, 2004 Larry J. Seltzer |
Stopping Spam SMTP authentication can corral spam, but implementation is thorny. |
CIO June 15, 2006 Thomas Wailgum |
The Security Plan for Your Wireless LAN Take advantage of the latest security tools and keep your users informed if you want to achieve wire-free bliss. |
Bank Technology News December 2008 Glen Fest |
The Paradoxes Of Mobile Adoption A new Javelin Strategy & Research report reveals layers of paradox involving mobile banking security. |
Bank Systems & Technology September 30, 2006 Maria Bruno-Britz |
Zions, ING Pick RSA Risk-Based Authentication Solution Security solutions provider RSA saw its Adaptive Authentication solution implemented at Salt Lake City-based Zions Bank and ING Direct for the banks' online retail banking customers. |
T.H.E. Journal August 2000 |
System Eases Wireless Networking Management Lucent's ORiNOCO version 6.0 software provides HP-OpenView network management and configuration tools, and adds RADIUS-based Media Access Control (MAC) authentication for the ORiNOCO high-speed wireless networking system.... |
InternetNews February 14, 2006 Erin Joyce |
IT to Endpoints: Who Are You? Security vendors say enterprises need to be a lot more picky about their network access protocols. |
T.H.E. Journal June 2006 Doug Gale |
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. |
Wall Street & Technology November 18, 2005 |
Stronger Authentication Single-factor authentication is insufficient for online financial services, according to the Federal Financial Institutions Examination Council (FFIEC). |
InternetNews May 14, 2004 Ryan Naraine |
Risk Management, The Microsoft Way How do you secure the 'world's largest experimental computer network'? Redmond shares its risk-management security strategy. |
Bank Systems & Technology October 30, 2007 Nancy Feig |
Banks Using Mobile Phone for Out-of-Band Authentication Amid increasing pressure to protect customers online, some of the largest global banks are turning to out-of-band authentication to fortify their Web banking services. |
InternetNews May 12, 2011 |
Object-Based Storage Debated at Interop The world of storage is undergoing a transformation with new object-based storage technology. |