TITLE

Of Firewalls, Consultants And, Yes, Hacker Insurance

AUTHOR(S)
Albright, Peggy
PUB. DATE
July 2000
SOURCE
Wireless Week;07/24/2000, Vol. 6 Issue 30, p30
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the hacker insurance policy for wireless operators offered by Conterpane Internet Security of San Jose, California. Coverage of the insurance policy; Cost of coverage for Counterpane clients; Perpetrators of security violations. INSET: A Second Look At Hacker Insurance.
ACCESSION #
3464480

 

Related Articles

  • The insider.  // ComputerWorld Hong Kong;1/10/2008, Vol. 25 Issue 1, p12 

    An interview with Bruce Schneier, founder and chief technology officer (CTO) of Counterpane, is presented. He offers his view on the computer security problem. He believes that law enforcement officials should improve on prosecuting criminals in order to prevent computer crimes. When asked about...

  • IN BRIEF.  // Computer Weekly;10/31/2006, p4 

    The article presents news briefs related to the computer industry. British Telecom PLC has acquired U.S.-based Counterpane Internet Security Inc., under its strategy to develop its global professional services capabilities. Nestlé Corp. has purchased risk assessment software from Strategic...

  • Feel insecure? Give outsourcing a go. Berinato, Scott; Petersen, Scot // eWeek;05/22/2000, Vol. 17 Issue 21, p14 

    Reports that several computer-security technology vendors in the United States are expanding their offerings to accommodate managed security services. Axent Technologies Inc.'s launch of its overarching managed security services model under the ServiceShield brand; Components of Axent's...

  • Humans on Watch. Desmond, Paul H.; Hardling, Elizabeth U.; Waters, John K. // Software Magazine;Jun/Jul2000, Vol. 20 Issue 3, p12 

    Focuses on managing computer security systems. Comment from Bruce Schneider, chief technical officer of Counterpane Internet Security Inc., on security as a process; Information on human interface offered by Counterpane; Statement issued by David Trapper, research analyst, on the demand for...

  • DynTeck and Counterpane partner to provide network security for homeland defense. McHale, John // Military & Aerospace Electronics;Sep2002, Vol. 13 Issue 9, p3 

    Reports the partnership between DynTek company and Counterpane Internet Security Inc. in California. Efforts of the partners to provide network security for homeland defense; Prevention against cyber terrorism; Details on the agreed terms and conditions.

  • ID cards are a waste, says security guru. Goodwin, Bill // Computer Weekly;3/8/2005, p16 

    The article presents information according to which identification cards, ID cards are of no importance. Security author and chief technology officer of Internet security group Counterpane, Bruce Schneier tells "Computer Weekly," why ID cards could exacerbate crime and why the only way to beat...

  • OnGuard >> Counterpane monitors activity logs. Duvall, Mel // Inter@ctive Week;04/17/2000, Vol. 7 Issue 15, p57 

    Presents news briefs on the Internet industry in the United States as of April 17, 2000. Security monitoring service launched by Counterpane Internet Security; EDoctor service introduced by Trend Micro; Participation of Baltimore Technologies in a program for the Federal Bridge Certification...

  • Security needs spawn services. Messmer, Ellen // Network World;04/03/2000, Vol. 17 Issue 14, p1 

    Reports on the growing popularity of managed security services that can identify denial-of-service attacks or other threats to computer networks. Monitoring of customers' internal servers and network traffic; Offerings from such firms as Internet Security Systems, Counterpane Systems and Pilot...

  • Custom-fit security apps. Fisher, Dennis // eWeek;03/19/2001, Vol. 18 Issue 11, p1 

    Reports on the evolution of managed security services from one-size-fits-all services into unique, proactive offerings tailored to the individual customer. Focus on gathering real-time intelligence on attacks, vulnerabilities and exploits; Use of data mining and artificial intelligence...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics