Search This Blog

Friday, February 27, 2009

PCI council ranks security risks, milestones; Compliance Complaints

PCI council devises a 12-step program for meeting security standards
Network World logo

Compliance Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Brocade
rule

Architectural Brief
Providing server connectivity products is the next step in fulfilling Brocade's mission to deliver enterprise-class, end-to-end storage networking solutions. With the introduction of Brocade server connectivity solutions, Brocade is now extending fabric based services to data center server platforms for dependable and high-performance storage access.

rule

Spotlight Story
PCI council ranks security risks, milestones

Tim Greene By Tim Greene
Businesses shouldn't let financial pressures put PCI-security compliance on the back burner, and the PCI Security Standards Council has devised has devised a 12-step program to help merchants get there. Read full story

Related News:

Network World on Twitter Get our tweets and stay plugged in to networking news.

Compliance Complaints IDC, a sister company to CSO, predicts that IT security spending will still grow by nearly 10 percent in 2009, and even faster in 2010. They characterize security as "the least likely area [in IT] to face cuts in response to the current economic crisis.

Secure Passage releases a new version of its firewall-analysis tool Secure Passage is rolling out a news version of its firewall analysis and compliance-verification software that identifies unintentionally allowed risky behavior on business networks.

FCC threatens fines on data protection rules The U.S. Federal Communications Commission may fine 600 operators for failing to properly file annual reports proving that they protect customer data.

Controversial data-security rules slow to take hold in state Massachusetts officials this month gave companies a second reprieve on complying with new regulations aimed at any entity that stores the personal data of state residents. They also softened a particularly contentious provision requiring businesses to ensure that third parties handling such data are in compliance with the rules.

Cutting Through the Fog of Cloud Security Daniel Flax, CIO at New York-based investment banking and financial services firm Cowen and Co. , relies on cloud computing to automate his company's sales activities. While he's satisfied with cloud technology's potential to lower upfront costs, decrease downtime and support additional services, he admits that he has had to work hard to get a handle on the emerging technology's security weaknesses . "Security is one of the things we've had to come to grips with," he says.

Report cites potential privacy gotchas in cloud computing Companies looking to reduce their IT costs and complexity by tapping into cloud computing services should first make sure that they won't be stepping on any privacy land mines in the process, according to a report released this week by the World Privacy Forum.

Novell aquisition bolsters ID governance portfolio Novell has quietly bolstered its ID governance portfolio after acquiring the technology assets of a tiny British company and signing a 'perpetual' licensing deal with California-based ActivIdentity.

10 Steps for Mitigating Data Risk During a Merger Merger and acquisition activity stands to increase as global markets struggle to stay afloat during the worst economic slowdown in decades. What will you do when you find out you're about to acquire or consolidate with another firm or division? Are you aware of the risks you may be inheriting? What data is going to demand the highest availability? What IT regulations will you have to address and how do you know if existing controls already address them?

Proposed Law Saves Internet User Data In the most recent effort to thwart child predators online, both the U.S. House and Senate are considering bills that would require any Internet access provider -- possibly including public Wi-Fi hotspots -- to retain Internet user data for up to two years.

Ethernet Alliance establishes certification program The Ethernet Alliance recently announced it is starting up a certification program to identify equipment that has met certain standards.

Stimulus Package Sets H-1B Limits A provision requiring banks receiving federal bailout funds to give hiring priority to U.S. workers over foreigners with H-1B visas made it into the final version of the economic stimulus bill that President Barack Obama signed last week.

Microsoft is the largest U.S. user of H-1B visas, study says Microsoft used more than twice the number of foreign workers as any other IT company, according to one study.

Web standards on the edge Although there are many reasons why the Web fails to render appropriately in browsers, the two main reasons today are browser bugs and ambiguities in the standards, says Ian Hickson, a software engineer at Google and editor of the W3C HTML 5 specification.

When good browsers go bad - and they all do Jeffrey Zeldman must have thought he'd never live to see the day. Ten years after he co-founded the Web Standards Project , all of the major browser vendors have shown renewed commitment to supporting World Wide Web Consortium (W3C) standards in the last few years -- and they're following through.

Comply! Compliance with regulations is a bear, but there are tools to get you there. Our revamped Product Guide can help you sort through them all.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Brocade
rule

Architectural Brief
Providing server connectivity products is the next step in fulfilling Brocade's mission to deliver enterprise-class, end-to-end storage networking solutions. With the introduction of Brocade server connectivity solutions, Brocade is now extending fabric based services to data center server platforms for dependable and high-performance storage access.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


The Power of LAN Test Tools.
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.

 

02/27/09

Today's most-read stories:

  1. Turning 5,000 discarded cell phones into art
  2. Verizon Wireless takes aim at pesky 'Rabbit'
  3. IPhone plagues Princeton with flaky Wi-Fi problems
  4. New Google dashboard provides downtime information
  5. 40% of geeks surveyed really work fewer than ... say what?
  6. Microsoft has big growth plans even as economy limps
  7. Juniper's answer to Cisco in the data center: Stratus Project
  8. Juniper joins top-of-rack switch fray
  9. Top 10 removable media security incidents
  10. Nortel announces more layoffs
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: