Access "Mixed Signals"
This article is part of the January 2007 issue of Keep today's threats close and tomorrow's closer
RFID gives businesses--and bad guys--an easy way to track and change information. As one of the fathers of the RFID industry, Kevin Ashton never seems to be far from controversy. Three years ago, he helped introduce the Electronic Product Code (EPC), an RFID specification, to the suppliers of Wal-Mart and Best Buy, and the U.S. Department of Defense, which manages the largest supply chain on the planet. Now, as security experts demonstrate with alarming regularity how easy it is to hack RFID-enabled credit cards and e-passports, Ashton is calling for a new standard from EPCglobal, the EPC standards body, to secure RFID tags on shipping containers, palettes and individual store items. The new standard, EPC Generation 3, would add the security features suppliers and retailers need to prevent attacks from rogue RFID reader devices, which, along with RFID tags, will become cheap and ubiquitous in the coming years, says Ashton, vice president of marketing at the RFID reader maker ThingMagic. He's also co-founder of the MIT-based Auto-ID Center, a nonprofit ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
How to setup and configure syslog to view and filter data
Your network devices are trying to tell you that you're under atta ck. Syslog helps you sort through the data overload and get the message.
-
SonicWALL SSL VPN 4000 product review
In this product review of SonicWALL SSL VPN 4000 security tool and appliance get information on setup, pricing, configuration, installation, remote access and policy features.
-
UTM product review: WatchGuard Technologies' Firebox X 1250e
WatchGuard Technologies' Firebox X 1250e
-
Identity Management: Apere's IMAG 500
Apere's IMAG 500
-
Mixed Signals
by Mark Baard
RFID gives businesses-and bad guys-an easy way to track and change information.
- View Point
-
How to setup and configure syslog to view and filter data
-
-
Core Security Technologies Core Impact 6.0 security tool review
In this product review, learn how Core Security Core Impact 6.0 tool can assist in ethical hacking a penetration testing, and get info on setup, reporting and management.
-
Virtual Threats
by Dennis Fisher
Virtual machines save you money in the data center, but can you ignore their security implications any longer?
-
Recent Releases: Security product briefs, January 2007
Read about the security products that launched in January 2007.
- At Your Service: January 2007 managed services security news
-
Face-Off: Schneier, Ranum debate privacy and personal information
Does Secrecy Help Protect Personal Information?
-
Who's There?
Enterprises have a pressing need for endpoint security, but choosing a system that screens PCs before allowing them network access requires careful consideration.
-
Core Security Technologies Core Impact 6.0 security tool review
-
Columns
-
Ping: Nikk Gilbert
Nikk Gilbert
-
Editor's Desk: Celebrating 10 years of Information Security magazine
A Toast to Ten Years
-
Face-Off: Schneier, Ranum debate privacy and personal information
Does Secrecy Help Protect Personal Information?
-
Perspectives: Post-admission controls the next step for NAC
Post-admission controls would shore up NAC/NAP shortcomings.
-
Ping: Nikk Gilbert
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO