TITLE

Big blue calls for beefed-up security

PUB. DATE
April 1998
SOURCE
Network World;04/13/98, Vol. 15 Issue 15, p6
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the call being made for unrestricted levels of United States (U.S) domestic encryption technology by chairman of the International Business Machines (IBM) Lou Gerstner, which would enable corporate network to better protect themselves from hackers.
ACCESSION #
499080

 

Related Articles

  • Firewall spec to strengthen Web security. Bowen, Ted Smalley // InfoWorld;12/08/97, Vol. 19 Issue 49, p1 

    Discusses the efforts of Web-server vendors and object-software players to standardize the creation of secure Internet commerce applications. Object Management Group's (OMG) efforts to address the barrier to the widespread adoption of I-commerce software; Proposals for a standard means of using...

  • DES still sets the standard for heavy-duty desktop encryption. Khan, Saad // PC Week;5/23/94, Vol. 11 Issue 20, p141 

    Focuses on Data Encryption Standard (DES) as the format of choice for locking a file using encryption beyond the weak proprietary forms that can legally be exported from the United States. Use of DES in products that employ non-proprietary encryption; Adoption of DES by the U.S. government in...

  • Shifting sands of standards.  // InfoWorld;01/26/98, Vol. 20 Issue 4, p103 

    Discusses efforts to help vendors standardize more quickly on ways for virtual private networks (VPN) system. to establish trust. Internet Engineering Task Force's emerging Internet protocol (IP) Security (IPSec) protocol; Designation of a number of technologies for users and systems to...

  • Customer Records Security Rule Issued. Blackwell, Rob // American Banker;12/27/2000, Vol. 165 Issue 247, p4 

    Reports the final rule released by federal bank and thrift regulators establishing guidance for computer security standards to safeguard customer records at financial institutions in the United States. Need for each bank to implement a comprehensive written security program.

  • Vendors tout privacy spec. Jones, Jennifer // InfoWorld;06/26/2000, Vol. 22 Issue 26, p12 

    Introduces the Platform for Privacy Preferences (P3P), a computer privacy standard created by the World Wide Web Consortium (W3C). P3P-enabled products introduced by Microsoft Corp., IBM Corp. and AT&T Corp.; Idea behind the standard; Criticism against the standard; Process of making a Web site...

  • FTSE firms in security quest offer different approaches to 'deperimeterisation'. Saran, Cliff // Computer Weekly;11/18/2003, p10 

    Information technology (IT) directors and security chiefs at some of Great Britain's largest companies, who have been collaborating on new security standards, are testing different technical approaches to the development of comprehensive standards for IT security. Delegates at security...

  • Gasboy CFN III Version 3.6 now PCI PA-DSS compliant.  // National Petroleum News;Oct2010, Vol. 102 Issue 8, p9 

    The article reports that Gasboy International Inc.'s CFN III version 3.6 has been validated by the Payment Card Industry Security Standards Council in compliance with the Payment Application Data Security Standard (PA-DSS).

  • AOL To Users: Opt Out Again. Brown, Doug // Inter@ctive Week;11/29/99, Vol. 6 Issue 49, p8 

    Discusses issues on the privacy policy issued by America Online company. Views on the company's approach to computer privacy; Opposition to the practice of opting out; Groups which promote privacy standards.

  • CCI API to speed security inspection.  // Seybold Report on Internet Publishing;Dec98, Vol. 3 Issue 4, p23 

    Reports on the development of a standard for computer security systems called the Common Content Inspection API. Functions; Names of standard developers.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics