Identity management is rapidly becoming a new battleground for rivals Microsoft Corp. and Sun Microsystems Inc., each of which is committing support for different standards. While Microsoft demonstrated new security and ID management services running together under the WS-Federation (Web Services Federation Language) specification just last week, Sun is planning to announce this week three […]
It all started with Lint. Actually, it was Secure Lint, to be precise, and it was one of the last projects started by the L0pht hacking collective in 1999 before the group became part of @stake Inc. the next year. The project began with the goal of creating a lexical analysis tool to find potential […]
LAS VEGAS—Computer Associates International Inc. on Tuesday will announce a new subscription-based vulnerability detection and remediation service, along with a new vulnerability management appliance. The new offerings are a part of the companys effort to move more deeply into security, particularly the security management market, officials said. CAs eTrust Managed Vulnerability Service is a twist […]
The theft of tens of thousands of credit card numbers from a database belonging to BJs Wholesale Club was, in some ways, an anomaly. Not only did BJs Wholesale Club Inc. management take the rare step of disclosing the theft publicly, but most of the card issuers moved quickly to notify customers of the incident. […]
When Donna Getgen opened a letter from her credit union in March, the message within was anything but routine. Getgen was informed that she had been the victim of a cyber-theft. Getgens account number, the letter read, was stolen from a database at BJs Wholesale Club Inc., where she shopped from time to time. Stunned, […]
LAS VEGAS—Yogesh Gupta used his keynote at Computer Associates CAWorld conference here Monday morning to demonstrate a new wireless LAN (WLAN) security and management tool that is capable of managing encryption keys across all wireless devices and access points and preventing unauthorized access through the use of virtual security zones inside the network. Gupta, senior […]
LAS VEGAS—Ken Cron may have the qualifier “interim” before his title of CEO at Computer Associates International Inc., but he is not simply sitting on his hands while the board of directors searches for a permanent head for the company. Instead, he is spending much of his time working closely with CAs top executives to […]
Security experts are tracking two new threats that have emerged in the past few days, including a worm that uses seven mechanisms to spread itself. The worm is known as Kibuv, and researchers first noticed its presence Friday. Kibuv affects all versions of Windows from 98 through Windows Server 2003 and attempts to spread through […]
NEW YORK—The federal government and private enterprise should band together and hold software developers responsible for the poor state of security of their applications, according to the White Houses former top cyber-security official. Speaking this week at the eWEEK Security Summit here, Richard Clarke, chairman of Good Harbor Consulting LLC, of Herndon, Va., and former […]
NEW YORK—Richard Clarke, the former top counterterrorism official in two administrations, called for Secretary of Defense Donald Rumsfeld to resign following the prisoner abuse scandal in Iraq and the beheading of an American civilian by suspected al-Qaida operatives. Clarke, speaking at the eWEEK Security Summit here Wednesday, said Rumsfeld should be held accountable for the […]