Heartland tries to rally industry in wake of data breach The CEO of Heartland Payment Systems is calling for the card payments industry to share security information and consider end-to-end encryption. Monster.com reports theft of user data Monster.com is advising its users to change their passwords after data including e-mail addresses, names and phone numbers were stolen from its database. Information security 'how not to's' It's not easy getting information security right. It is easy to get advice (often from vendors who want to sell you their semi-magic fix for all that ails you) on what you should be doing. But actually protecting your corporate or personal data turns out to be hard in the real world. Take a look at the Identity Theft Resource Center's report on what happened last year to see. Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment