Security confab focuses on trust, tools

Cryptographers and security firms debate the potential privacy dangers of so-called trusted computing. Also: RSA unifies its identity and access management products.

CNET News staff
3 min read
roundup Hackers are thinking up more and more ways to sneak through software gaps into personal and office computers. The security companies and experts gathering at the RSA Conference 2003 in San Francisco are working to put a stop to it--how do their efforts shape up?

Click here to Play

Keeping your PIN private
Larry Hines, product manager, Hewlett-Packard

Click here to Play

Fingerprints--an open sesame for PDAs?
Michael Liu, product manager, Hewlett-Packard

Click here to Play

Passwords with a 60-second shelf life
Chris Mills, product manager, RSA Security

Click here to Play

DOJ says trust is key to fighting cybercrime
Christopher Painter, deputy section chief, U.S. Justice Dept.

Panel: Security is serious business
Security experts say the private sector needs to get serious about network protection before a major cyberattack results in government intervention.
April 17, 2003

RSA to integrate ID products
The security company is pulling its identity and access management products into a single framework called Nexus that will be compliant with Liberty Alliance authentication.
April 17, 2003

Trusted computing comes with a warning
An initiative by technology giants to add security hardware to the PC has cryptographers worried but security companies slavering.
April 16, 2003

Commit a crime, no network time?
A panel discussion gets combative as former cybercriminal Kevin Mitnick argues that hackers convicted of computer crimes can sometimes be trusted.
April 16, 2003

Filling in security GAAPs
A bid to promote good practices in security could finally make IT security as popular--or at least as standardized--as financial reporting.
April 16, 2003

Liberty Alliance moves ahead
Novell and other members of the group, which is developing online identity standards, provide details of Phase Two specifications and demonstrate new features at the RSA Conference.
April 15, 2003

Lawyers see security suit-riddled future
Speaking at the RSA data security conference, lawyers warn of Harry the Hacker and say security law could be the next big area of cyber law.
April 15, 2003

Security a bright spot for IT spending
The technology sector remains depressed, but increased government spending and concern about privacy could have security companies riding higher in a down market.
April 14, 2003

Group opens for shared work
Computer Associates and partners launch the Open Security Exchange, devoted to developing best practices and promoting integrated products and services.
April 14, 2003

Windows gets tough on spam, viruses
In the second year of Microsoft's Trustworthy Computing initiative, the company details a future version of its OS that will make it easier to detect viruses and prevent spam.
April 14, 2003

HP bolsters Unix security
Hewlett-Packard ups the security of its HP-UX 11i version of Unix, unveiling tools to ease the setting of a computer's security levels and nabbing a security certification.
April 14, 2003

McAfee aims spam tools at small business
McAfee Security's new spam-fighting software is designed to help small and midsize businesses ward off annoying spam, the first product resulting from its acquisition of DeerSoft.
April 14, 2003

SurfControl unveils IM filtering tool
The Web filtering company debuts new technology that helps companies block instant messaging--an application beloved by employees but a headache for some IT managers.
April 14, 2003

New tools aim to secure corporate IT
A bevy of technology companies--both big and small--use the RSA Conference 2003 to unveil a slew of new security products aimed at protecting corporate IT infrastructure.
April 14, 2003

Related coverage
Open-source team fights buffer overflows
The OpenBSD project hopes new changes to its latest release will eliminate a software issue that has been plaguing security experts for more than three decades.
April 11, 2003

Honeypots get stickier for hackers
If Lance Spitzner and the Honeynet Project have their way, network defenders will get sweeter on the "honeypot"--a traditional method of detecting online intruders.
April 11, 2003