By the Numbers: September 2003By Baselinemag | Posted 2003-09-10 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
There's no consensus on what constitutes cyberterrorism from state to state.
States vs. Cyberterror:
Where is it a Crime?
Makers of accounting software are putting their money where eXtensible Business Reporting Language (XBRL) is, a recent survey found. Two-thirds of respondents plan to have XBRL-enabled products by the end of 2004, with those serving large companies leading the way.
If you think network security is a losing battle, you may be right. Security services firm Qualys found that 30 days after a critical vulnerability is discovered, only half of the systems at risk are fixed. After 60 days, 25% of systems are still exposed. Worse yet, half of the most prevalent and critical vulnerabilities are replaced by new ones every year. Where's a white flag when you need one?
Utility Computing: Waiting for a No-Show?
Utility-computing providers appear to have set expectations they may not be able to meet, according to a survey from Saugatuck Technology. While vendors believe the main benefit of the "pay-as- you-go" approach will be to reduce capital expenditures, users are far more concerned about reducing operating costs. Regardless of the message, companies are eager to sign up; they expect the utility-computing infrastructure to be ready in 18 to 24 months. Too bad no one told the vendors: Many estimate it will be 36 to 60 months before they are ready to deliver.
If companies were not exactly happy about the Sarbanes-Oxley auditing act in 2002, they were at least a lot more optimistic, according to a survey by PricewaterhouseCoopers. Top executives admitted in June that complying with Sarbanes-Oxley will be more expensive than expected...