Friday, May 01, 2009

Where PCI DSS Still Falls Short and How to Improve It; Federal CISOs decry excessive paperwork

Cloud Standards: Trickier than Nailing Jell-O to a Wall
Network World logo

Compliance Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Splunk
rule

Easily Harness, Analyze, Manage Data
Working with any application, server or network device, Splunk collects, stores, indexes and secures massive amounts of data, allowing you to search, alert, report and analyze IT activities. What used to take hours or days now takes minutes, eliminating costly, inefficient silos.

rule

Spotlight Story
Where PCI DSS Still Falls Short and How to Improve It

By Ariel Silverstone
There's no doubt that the mere existence of a uniform policy -- adopted, recommended and even mandated by such firm rivals as American Express, Visa and MasterCard -- is a huge step forward. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Federal CISOs decry excessive paperwork Unnecessary paperwork and too much focus on compliance reporting are two of the biggest distractions for federal Chief Information Security Officers trying to shore up...

Group proposes cloud management standard DMTF creates new group dubbed the Open Cloud Standards Incubator, which will be dedicated to addressing the need for open management standards for cloud computing.

Another Data Center Headache: Log Data Exploding Following the March, 2004, bombings in Madrid, Spain, law enforcement searching for leads on those responsible for the attacks focused on the cell phones used by the terrorists and requested that European telecommunications providers turn over their call data. The only problem: It took the companies weeks to find the relevant data.

802.1Qay closes in on standardization The IEEE last week said that its 802.1Qay specification for service-provider networks has entered the final phase for ratification as a standard.

Cloud Standards: Trickier than Nailing Jell-O to a Wall Just try creating a definition of cloud computing that's broad enough to encompass all its permutations and narrow enough to provide technical guidance on how to get one cloud talking to another.

Watchdogs smack FCC over E-Rate A new report issued by the Government Accountability Office says it is virtually impossible to measure the success of the Federal Communications Commission’s E-Rate program...

Study: IT Security Certifications Required by More Employers More companies are requiring IT security certification, according to research released recently by the Computing Technology Industry Association (CompTIA).

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Splunk
rule

Easily Harness, Analyze, Manage Data
Working with any application, server or network device, Splunk collects, stores, indexes and secures massive amounts of data, allowing you to search, alert, report and analyze IT activities. What used to take hours or days now takes minutes, eliminating costly, inefficient silos.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

05/01/09

Today's most-read stories:

  1. What kind of data center can you build with $500 million?
  2. 10 tips for swine flu planning
  3. Microsoft gives server apps virtualization sneak peek
  4. It takes a village idiot: The jerks of online forums
  5. Locking out users gives attackers a tool for DoS
  6. Swine flu threat raises telework questions
  7. Watchdogs smack FCC over E-Rate
  8. Microsoft targets Windows, Linux management
  9. Revving up telework, Obama style
  10. Some IT skills see pay hikes during downturn
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment