Search This Blog

Tuesday, February 10, 2009

Is compliance with standards achieving the goal of protecting data?

Compliance: An issue of substance
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by sletter is sponosred by Trend Micro
rule

Four Layers of Security Protection.
Web threats are coming at you from every angle. This whitepaper reveals how to protect your network at four different layers to successfully fight the latest web threats. The four layers of protection are deployed in the cloud, at the Internet gateway, across network servers and at the end points. Download this whitepaper now.

rule

Spotlight Story
Is compliance with standards achieving the goal of protecting data?

M. E. Kabay By M. E. Kabay
The prevalence of data theft has led to increased enforcement of compliance with standards to protect data - surely a Good Thing, right? Well, maybe not in the way compliance is sometimes being enforced. Longtime colleague Bob Gezelter contributes his thoughts today on the unreasoning application of security standards. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Don't be a data loss victim Somebody was siphoning customer financial data from a chain of gas station/convenience stores.

7 ways to stop data breaches The experts all say that data security goes beyond the use of technology. Nevertheless, there are numerous tools and techniques that IT professionals can use to improve their organization's stance on data security.

Steps you can take now to help reduce data breaches Sophos security analyst Michael Argast shares his tips on what network managers can do to help prevent data breaches. With a little diligence, you can bolster your network security to help prevent the loss or compromise of sensitive data.

Debit-card processor claims data breach part of global fraud operation Heartland Payment Systems, the Princeton, N.J.-based provider of credit and debit processing, payment and check management services, Tuesday disclosed it has been the victim of a data breach.

Cloud computing and compliance: Be careful up there Using the cloud for data processing and storage may have its advantages in terms of simplicity and cost, but ensuring regulatory compliance will not be nearly so simple.

Heartland breach raises questions about PCI standard's effectiveness While it's not yet known if Heartland Payment Systems' data breach will count as the largest card heist ever, some analysts say what is clear is that the Payment Card Industry (PCI) data security standard isn't sufficient.

Heartland data breach could be bigger than TJX's A data breach disclosed Tuesday by Heartland Payment Systems may well displace TJX Companies' January 2007 breach in the record books as the largest ever involving payment data with potentially over 100 million cards being compromised.

NAC questions nag at big security vendors Symantec and McAfee appear to be bumping up against a common wall when it comes to one component typically found in security software suites: Network access control.

Endpoint security: Is the future in software suites? Symantec, McAfee and Trend Micro remain market leaders in endpoint security in an era when the race is pointed toward security-software suites that combine antimalware, network access control and systems management functionality

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by sletter is sponosred by Trend Micro
rule

Four Layers of Security Protection.
Web threats are coming at you from every angle. This whitepaper reveals how to protect your network at four different layers to successfully fight the latest web threats. The four layers of protection are deployed in the cloud, at the Internet gateway, across network servers and at the end points. Download this whitepaper now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

02/10/09

Today's most-read stories:

  1. Wikileaks releases 6,780 Congressional reports
  2. Mac clone maker wins legal round against Apple
  3. Microsoft rounds out voice assault
  4. Security problems still plague retailers' wireless LANs
  5. Mommas don't let their babies grow up to be engineers
  6. Porn site feud spawns new DNS attack
  7. Top 10 spam-friendly registrars named and shamed
  8. Cisco is not ruling out layoffs
  9. Nortel still signing up customers
  10. Apple planning TV with iTunes integration and DVR capability?


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: