More articles by "Mark Merkow, CCP, CISSP - Page 3"

New Payment Systems Poised For Primetime
When selecting an appropriate payment option for your e-business, it's critical to understand what's happening behind the scenes with security and authenticating mechanisms. As part of our special ...
Wrestle Back Your Privacy
As controversial as privacy problems within the digital frontier have become, few solutions to help unwitting Web surfers wrestle back their privacy rights have appeared in the marketplace. Until ...
The Next Big Thing
Looking for a way to have greater stickiness on your site, deeper customer intimacy and higher brand loyalty, not to mention higher profits? Well, a few innovative folks over at notHarvard.com thin...
Reinforcing Your Network Security: Taking Personal Responsibility
New e-businesses need to be aware of what's involved with setting up secure networks. This week's column offers a big picture view of ongoing responsibilities to maintain a secure computer and E-co...
On Highest Alert
The denial of service attacks several weeks ago on Yahoo, eBay, E*Trade, Buy.com, Amazon.com and others crystallizes the dire need for strong security measures on Internet-attached networks. To def...
Security Technologies -- Part Four
In the fourth and final part of our series covering security technologies, we examine the software and resources that are currently available to help you effectively stand guard over your systems a...
Virtual Private Networks For Dummies
Virtual Private Networks are a major part of secure Internet operations. ECommerce Guide's Mark Merkow's newest book, Virtual Private Networks for Dummies, walks you through the maze of cryptograph...
Security Technologies -- Part Three
Part three in our four part series on security technology. This week, we take a look at how Intrusion Detection Systems can help to bolster the effectiveness of routers and firewalls by standing a...
Security Technologies - Part Two
Part two in our four part series on security technology. This week, we focus on firewall technology, how firewalls work to prevent security breaches, and where they fit in the overall security puzz...
E-Commerce Security Technologies - Part One
One of the hottest topics in the e-commerce industry is maintaining the integrity and security of an e-commerce site. This week we begin a four-part series on security technologies, and examine the...
An Ounce of Prevention
If you're concerned about the security of your site or system, then you should be aware of the existence of CVE - a list of information security vulnerabilities and exposures that aims to provide c...
How Do I Pay Thee? Let Me Count The Ways...
When deciding on a payment system for their e-commerce site, it's easy to get confused by the sheer number of choices and options available. So how does an e-merchant choose the right payment servi...
The Check's In The E-mail
Whether it's business-to-business or business-to-consumer E-commerce, e-checks can speed up, simplify, and protect your investment without requiring large new investments or any major changes to yo...
Information Privacy: The Other Side Of The E-commerce Coin
As an e-business owner, collecting private information from customers is a normal part of your daily operations. What many e-business owners don't realize is that it's their moral duty - and increa...
Goods and Services at Web Speed
Modern purchasing systems have turned into nightmare operations with the complexities of business re-engineering and supply-chain management. A general lack of technology to support these efforts ...
Evolving E-Commerce to the Next Generation
Internet sales order processing stands at a crossroads. With emerging payment standards, such as the Secure Electronic Transaction (SET) protocol, first-generation e-commerce practices are rapidly...
The State Of Digital Signatures Today
As digital signing of documents and messages become pervasive across the Internet, this is a valuable time to examine digital signatures in terms of where they stand today in the eyes of the US Fed...
Cruising on the E-Commerce Fast Track
This fall, the back seat of your car is going to get even busier if GM has its way. Their new business group, e-GM, just revealed its new e-business strategy that will allow you to browse the Web a...
Braving The Challenge Of Web-to-Legacy Integration
Internet sales order processing stands at a crossroads. With emerging payment standards, such as the Secure Electronic Transaction (SET) protocol, first-generation E-commerce practices are rapidly...
Inside The Microsoft BizTalk Framework - Part One
We peek inside the BizTalk Framework to investigate its possibilities as a solution to application integration problems and escalating costs in establishing an e-commerce enabled business.
Inside Electronic Commerce Modeling Language
Last month, ECML Version 1.0 was released, providing a set of simple guidelines for Web merchants to enable the uses of commercial electronic wallets at their sites. This month, we take a look at t...
Leveling the Security Products Playing Field - Part Two
Last time we waded into the alphabet soup that is the Common Criteria (ISO 15408), intended for the development of Protection Profiles (PPs), Security Targets (STs), and standardized testing of IT ...
Leveling the Security Products Playing Field
How can you effectively compare security products (firewalls, intrusion detection systems, etc.) across product lines and among different suppliers when all you have to go on is advertising and hyp...
A Look Inside Commerce XML (cXML) Version 0.91
The cXML Draft Specification has finally hit the streets! Be the first on your block to gain an inside view of the promises for efficient and cost-effective business-to-business E-commerce.
More Than A Language -- XML Is A Security Tool Too!
Like a panacea, everyone is turning to XML to solve even the stickiest of Internet communications problems. The latest significant news comes from IBM with the announcement of their XML Security S...

Free Resources

Subscribe To Our Daily Newsletter