Vulnerability Test: NEHEN Security

By Tom Steinert-Threlkeld  |  Posted 2002-01-01 Email Print this article Print
 
 
 
 
 
 
 

WEBINAR: On Demand Webcast As identity theft and credential-based attacks escalate, organizations wonder how this can be when they're investing so much time and effort deploying identity and access management solutions. Despite their best efforts, identity has become the most consequential attack vector to the modern enterprise. Organizations are essentially outmatched by increasing identity risks.

Modernizing Authentication — What It Takes to Transform Secure Access REGISTER >

At the behest of Baseline, Guardent Inc. security consultant Anthony Bettini took a crack at the code that protects the New England Healthcare EDI Network from unauthorized use.

 


123>
 
 
 
 
Editor-in-Chief
tst@ziffdavisenterprise.com
Tom was editor-in-chief of Interactive Week, from 1995 to 2000, leading a team that created the Internet industry's first newspaper and won numerous awards for the publication. He also has been an award-winning technology journalist for the Dallas Morning News and Fort Worth Star-Telegram. He is a graduate of the Harvard Business School and the University of Missouri School of Journalism.
 
 
 
 
 



















 
 
 
 
 
 

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters