Researcher Says IE Bug Could Spread Quickly A security analyst warns that a critical IE flaw that Microsoft has confirmed -- but has yet to patch -- is a prime candidate for another Conficker-scale attack Rackspace outages teach cloud lessons Back-to-back power outages at cloud service provider Rackspace offer some lessons that cloud providers and their customers can benefit from. Five of the biggest IPv6-based threats facing CIOs The IETF has identified many security threats related to IPv6, the long-anticipated upgrade to the Internet's main communications protocol. This token gesture secures sensitive data 2008 was a record year for the amount of sensitive information compromised through data breaches. Much of the purloined data was payment card data, which allowed thieves to use millions of credit and debit cards fraudulently. There's a new technology called tokenization that offers great promise for protecting sensitive data. If your organization is compelled to comply with the Payment Card Industry (PCI), you need to know about tokenization and how it can help you achieve and maintain PCI compliance while reducing the cost to do so. July Giveaways Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31. Network World on Twitter? You bet we are |
No comments:
Post a Comment