Access "Help From Above"
This article is part of the January 2006 issue of How to stop data leakage
Security managers are looking to the keepers of the Internet cloud for relief. Antigua--home of sunsets, sand and online point spreads--has become ground zero for Internet gambling. These offshore gambling sites are also prime extortion targets for organized criminals who threaten distributed denial-of-service attacks if monthly "protection money" isn't paid up. It's a scene right out of gangster movies with a high-tech twist. "We've been hosting some of these gaming sites, and they are literally being threatened by the mob," says Dr. Bill Hancock, former chief security officer at Savvis Communications, a Texas-based carrier and maintainer of an Internet backbone. "I've seen the e-mail messages. The gambling sites start off demanding $3,000 a month, then $30,000 a month. They may pay them off at first, but when it gets this expensive, there's no ROI. They turn to us asking, 'What can you do?'" Security managers for these gambling sites aren't the only ones asking that question. Others are also looking for a little help from above--the Internet cloud and the ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Recent Releases: Security product briefs, January 2006
Learn about the security products that launched in January 2006.
-
Authentication: TriCipher Armored Credential System v3.1.1
TriCipher's TACS v3.1.1
-
Preventing Data Theft, Combating Internal Threats
Defend against internal threats and prevent information leakage and hacker attacks with several tactics such as employee monitoring, behavioral analysis tools, encryption and incident response.
-
Mining NetFlow
Your routers and switches can yield a mother lode of security information about your network--if you know where to dig
-
Secure communications
by Dr. Juergen Schneider
This tip covers ways that you can secure a network to protect data from internal as well as external attacks.
-
Recent Releases: Security product briefs, January 2006
-
-
Peak of Security
IE 7.0, Firefox, Netscape: One of these browsers comes out on top—we'll tell you which one.
-
Secure Reads: Security and Usability
Read a review of the book Security and Usability.
-
Hot Pick: M-Tech Information Technology's ID-Synch 4.0
M-Tech Information Technology's ID-Synch v4.0
-
Help From Above
Security managers are looking to the keepers of the Internet cloud for relief.
-
Peak of Security
-
Columns
-
Perspectives: Midmarket organizations short on security budgets and respect
Industry solutions are tailored for big companies and big budgets--leaving SMBs in the dust.
-
Ping: Marcus Sachs
Marcus Sachs
-
Editor's Desk: The state of patching
Party Like It's 1999?
-
Layer 8: Time to call a security specialist?
Security Obsolescence
-
Perspectives: Midmarket organizations short on security budgets and respect
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO