Search This Blog

Tuesday, January 18, 2011

Most businesses confident they properly secure their credit card data

Microsoft re-issues Outlook 2007 update after Dec. blunder | Cybercrime and the U.S. criminal justice system

Network World Security

Forward this to a Friend >>>


Most businesses confident they properly secure their credit card data
Cisco surveyed over 500 businesses about their PCI experiences. Some surprises for sure In one of the most comprehensive PCI related surveys ever completed we find some very interesting results. This Cisco commissioned survey of 500 U.S. based companies asked IT decision makers questions around their PCI compliance efforts. The survey covers a broad scope of verticals such as healthcare, retail, education, government and financial sectors. Over 22% of the businesses surveyed had over... Read More


WEBCAST: Cisco

Mobile Powerplay: Secure, High Performance, Unified
The mobile revolution is here—and here to stay. iPhone, iPad, Droid--employees bring their mobile devices into the workplace, and they want access to personal and professional information. This brings a new set of concerns for IT and the business: IT needs to ensure that the corporate network and the access remains secure. Register Now

WEBCAST: Dell

Webcast: Is Virtualization Right for SMBs?
You've heard that large companies embrace virtualization to consolidate their data centers, reduce costs, and improve operating efficiency and IT service levels. However, your data center only has tens of servers, not hundreds or thousands. Should you consider virtualization as well? View this webcast to learn more. Register now!

Microsoft re-issues Outlook 2007 update after Dec. blunder
Nearly a month after it yanked an Outlook 2007 update over connection and performance problems, Microsoft has re-released the patch to correct its mistakes. Read More

Cybercrime and the U.S. criminal justice system
In this series of columns, I am reviewing particularly interesting chapters in The Handbook of Technology Management (John Wiley & Sons, Inc.) edited by Professor Hossein Bidgoli. Read More


WEBCAST: Iron Mountain

Online Server Backup Checklist
Small businesses are quickly adopting the cloud as an alternative way to back up their critical data. If you haven't yet made the move to the cloud, attend this webcast to explore what to look for in an online backup solution to save you time, money and free up your precious IT resources. Learn more!

Israel tested Stuxnet worm, says report
The Stuxnet worm that disrupted Iran's ability to enrich uranium into bomb-grade nuclear fuel was reportedly created by Israel and the U.S. Read More

Fraud incident reports down, says report
A quarterly measure of fraud reporting among employees finds violations have dropped Read More


WHITE PAPER: Akamai Technologies

Electronic Software Delivery
IDC : Those that are focused on providing an exceptional software acquisition are increasingly utilizing technology that helps create and measure a positive user experience. In this IDC whitepaper, review the benefits and processes of electronic software delivery. Learn the components of a successful solution that is optimal to the end user. Learn more

Microsoft to Use Privacy in Battle with Google
Does it take more than a shirt printed with the word "private" and lip service for a company to prove how important your privacy is to it? Microsoft seems ready to battle Google by competing on privacy, but not ready enough to protect your privacy from government surveillance.The past year was full of privacy leaks, so it's popular for companies to jump on the privacy bandwagon. Does it take more than a shirt printed with the word "private" and lip service for a company to prove how important your privacy is to it? Read More

5 Microsoft security flaws remain unpatched, despite 2 fixes
Microsoft kicks off 2011 with light Patch Tuesday Microsoft gave the security a world a light Patch Tuesday today, with only two updates, after issuing a record 106 security bulletins in 2010 and 17 in December alone. But that doesn't mean Microsoft products have no holes in them. In fact, security researchers say there are five unpatched zero-day flaws that Microsoft is still working to fix. Read More

UK cyber challenge aims to fill IT talent shortage
Paul Laverack of London is an actor, but he's considering a possible career change -- to computer security. Read More

Experts: Gov't trusted Internet identities a long way off
The White House makes a renewed push for trusted identities on the Internet. While many applaud the government for taking a hands-off approach, others say it will take years for anything to reach fruition. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Windows on verge of dropping below 90% market share
  2. Verizon iPhone antenna redesign may thwart 'death grip,' says expert
  3. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial
  4. Apple is professional Linux
  5. Android OS in 2011: 12 developments to keep Apple nervous
  6. Microsoft guy slams "President of the United States of Google"
  7. Google pays record bounty for Chrome bug
  8. Facebook wants to issue your Internet driver's license
  9. Investment firm dumps Cisco stock over human rights issues
  10. Is this a BlackBerry "Dakota" I see before me?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: