Home
 > TEC Blog > Laura Taylor

Author: Laura Taylor


Displaying results 1-10 (of 84)
 |<  < 1 2 3 4 5 6 7 8 9  >  >| 
Surf's Up at Akamai
Written By: Laura Taylor Published On: December 1 1999 Akamai has unveiled a killer IPO in a mere 14 months. Its innovative product called FreeFlow delivers website content at stellar speeds. Will it be able to deliver revenue at the same speed it can deliver content? Read More...
How To Mitigate Holiday Cybercrime
Written By: Laura Taylor Published On: November 1 1999 Shop.org, and the Boston Consulting Group, reported that sales during the 1998 holiday season grew by 230 percent. With today's tools, just about anyone can throw up a professional looking website, and make claims about tight security. How can you protect yourself from fly-by-night internet sites, and malicious cyber sleuths who are ready and waiting to "sniff your password and credit card information while transaction is in process? There no way to mitigate every single riskhowever common sense can do wonders helping eliminate e-tail dangers. It pays homework before shopping online. Read More...
ATM Machines Hacked in Moscow
Written By: Laura Taylor Published On: October 1 1999 Recently Moscow's ATMs have fallen victim to cyberfraud. How does ATM hacking take place? Has it happened in the United States? What can you do to safeguard against ATM hacking? Read More...
VPNs Are Hot, but What Are They?
Written By: Laura Taylor Published On: October 1 1999 The Virtual Private Network (VPN) market is exploding. There are many different ideas on what a VPN is, and how to implement them. This article clarifies what sound VPN products and services should include, and what to expect as the market matures. Read More...
Congress Acknowledges Outdated Banking Laws
Written By: Laura Taylor Published On: October 26 1999 Following a previous TEC News Analysis on the security of financial transactions, Congress and the White House have agreed to put into place new legislation for monitoring banking, including on-line banking. New banking laws that are more current than today's Depression Era banking laws need to be crafted to protect consumers, as well as the health of today's financial community. Today's financial institutions risk a host of internet attacks since today's hackers are more knowledgeable about information security than law makers. Read More...
Packard Bell / NEC Leads Secure Etoken Deployment
Written By: Laura Taylor Published On: October 22 1999 On October 19, Aladdin Knowledge Systems ( Nasdaq: ALDN ), a global leader in the field of Internet content and software security, announced with Packard Bell NEC International ( Nasdaq: NIPNY ), the leading brand of consumer PCs in Europe, an agreement to bundle approximately 50,000 eTokens on Packard Bell PCs. The eTokens, or Internet keys, will come in different colors so that all family members can have a unique color code. Retail shops in Belgium expect to have eTokenized PCs on their shelves by November. Read More...
IBM Firewall Discontinued
Written By: Laura Taylor Published On: March 13 2000 IBM plans to discontinue development and support of its AS/400 firewall and is referring existing customers to Axent, Checkpoint, and Cisco. Read More...
PrettyPark Virus Litters Cyberspace
Written By: Laura Taylor Published On: March 10 2000 There have been numerous reports of the PrettyPark virus running rampant on the Internet this week. Help keep cyberspace clean by wiping out the PrettyParks. Read More...
New Market for Security Insurance
Written By: Laura Taylor Published On: March 1 2000 Some insurance companies are now offering policies which protect companies against system, network, and website security losses. What do these policies offer corporations that they don't get in their standard General Liability Insurance Policy coverage? Read More...
CIOs Need to Be Held Accountable for Security
Written By: Laura Taylor Published On: February 28 2000 As systems, networks, and websites suffer new magnitudes of Denial of Service attacks, malicious network scans, and network intrusions, organizational CIOs need to be held accountable for information security. Read More...
Displaying results 1-10 (of 84)
 |<  < 1 2 3 4 5 6 7 8 9  >  >| 

Recent Searches
Others A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

©2014 Technology Evaluation Centers Inc. All rights reserved.