Search This Blog

Friday, December 14, 2007

Data breaches, regulations fueling data encryption adoption; IBM

Compliance Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Data breaches, regulations fueling data encryption adoption

Ellen Messmer By Ellen Messmer
Data encryption grows in government and business in reaction to data-breach fiascos, regulatory requirements. Read full story

Senior Editor Ellen Messmer covers security for Network World. Contact her at emessmer@nww.com.

MORE STORIESARROW


SPONSORED BY BLUE COAT
rule

Network World Analyzes Web Acceleration
Discover how to significantly improve document delivery times for users that are physically away from your centralized data center. A document that takes 80 minutes to delivery to a user across the globe could be delivered in three minutes with Web acceleration. Learn how your IT organization can benefit from this technology. Listen to this Webcast now.

rule
RELATED NEWS:

IBM upgrades identity management, focusing on user access and compliance, 12/12/07 IBM upgraded its identity management capabilities with tools to help customers manage user access to sensitive information, the company said Wednesday.

NSS Labs touts PCI certification program, 12/10/07 Security product-testing firm NSS Labs has started a certification program based on requirements associated with the Payment Card Industry security standard.

Can mid-market merchants comply with PCI standards?, 12/06/07 Nearly a year after TJX Companies suffered what is believed to be the largest identity theft to have hit a retailer, credit card companies are laying down the law for any merchant who transacts business with plastic. By New Year's Eve, all businesses that handle between 1 million and 6 million credit card transactions a year (primarily mid-market companies) must comply with the Payment Card Industry's new Data Security Standard (PCI DSS).

Ofcom rules that VoIP must do emergency calls, 12/07/07 The U.K. telecom regulator has, as expected, ruled that customers must be able to call the emergency services using VoIP.

Why should merchants keep credit card data?, 12/06/07 Who would question the assumption that retailers should protect their customers' credit card data? The retailers. As businesses that take credit cards have embarked on the costly trek toward the Payment Card Industry's (PCI) compliance, some members of the National Retail Federation, an industry trade association, are wondering why this security effort has fallen into their laps.

Microsoft uses new XBRL data tags in SEC filing, 12/07/07 Microsoft has submitted data to the U.S. Securities and Exchange Commission (SEC) using a newly released taxonomy for a financial reporting language designed to make it easier to compare companies' financial figures.

Security policies? Workers ignore them, survey says, 12/06/07 It's one thing to have a company-wide information security policy in place. But it's a whole different ball game to get employees to actually follow the policies -- even those that are IT types.


THE FASTEST FIREWALLS
Clear Choice Test  Crossbeam, IBM win raw performance test; Juniper scores on price.

HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

SPONSORED BY BLUE COAT
rule

Network World Analyzes Web Acceleration
Discover how to significantly improve document delivery times for users that are physically away from your centralized data center. A document that takes 80 minutes to delivery to a user across the globe could be delivered in three minutes with Web acceleration. Learn how your IT organization can benefit from this technology. Listen to this Webcast now.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/14/07

TODAY'S MOST-READ STORIES:

  1. Cisco opening up IOS
  2. AT&T employees sound off on telework cuts
  3. Verizon Business' managed services are key
  4. Payment processor accused of taking millions
  5. Can IT and end users get along?
  6. Microsoft pulls plug on potty-mouth Santa
  7. Seven Cisco bad luck happenings in '07
  8. The nine worst Microsoft products
  9. Cisco to quicken shift to software, data center
  10. Top six Cisco acquisitions of 2007


TOP 100 OF 2007


Storage Trends Explained

Learn how IT shops can optimize their current storage systems with new tools and practices in this informative Webcast, Storage Trends and Options. Listen to industry experts explain the latest developments and address the hype surrounding future storage platforms.

Click here for more information.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Compliance Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: