Search This Blog

Monday, July 13, 2009

This token gesture secures sensitive data

Three Better Ways of Doing Networking That We Ain't Doin'; The botnet world is booming
Network World logo

IT Best Practices

NetworkWorld.com | Update Your Profile


Sponsored by BMC Software
rule

Dell's SMART Approach to Workload Automation
Read a compelling case study by EMA, Inc. to learn how Dell uses BMC CONTROL-M to cut cost and increase productivity with workload automation.

rule

Spotlight Story
This token gesture secures sensitive data

2008 was a record year for the amount of sensitive information compromised through data breaches. Much of the purloined data was payment card data, which allowed thieves to use millions of credit and debit cards fraudulently. There's a new technology called tokenization that offers great promise for protecting sensitive data. If your organization is compelled to comply with the Payment Card Industry (PCI), you need to know about tokenization and how it can help you achieve and maintain PCI compliance while reducing the cost to do so. Read full story

Related News:

Three Better Ways of Doing Networking That We Ain't Doin'
All too many times in networking we are patching protocols, transports, etc., that were designed for networks nearly 30 years ago. Here are three things that we could do and should do to improve security, scalability and the overall network in general.

The botnet world is booming
With U.S. and South Korean government Web sites hit by distributed denial-of-service attacks this week by a botnet controlled by an unidentified attacker -- North Korea is suspected, however -- the shadowy world of botnets continues to grow unabated.

Take Care of Your Brain
It is obvious that being a good IT professional takes some brainpower. With optimal brain function you will be able to remember all sorts of technical details, troubleshoot problems faster, come up with creative approaches to tough technical challenges, and help you manage the stressful life as an IT professional. You need to remember to take care of your brain to optimize your performance.

Putting Some Realism into Cisco Certified Architect
The Cisco Certified Architect certification may well be the single biggest addition/change to the Cisco certification space since the introduction of CCNA and CCNP in 1998.

Security flaws in Social Security numbers is old news
There was a big hoo-hah last week about a paper published by folks at my old school, Carnegie-Mellon University. There was so much attention, in fact, that I found myself endlessly humming "Dear Old Tech" over and over. According to the press release, "Carnegie Mellon researchers find Social Security numbers can be predicted with public information." Is that startling information? More importantly, is it a security/identity fraud problem?

What's driving this university to IPv6? Going green
Ave Maria University, a liberal arts college near Naples, Fla., is looking to adopt IPv6 across its two data centers and all of its facilities management systems, which are used for monitoring building access, temperature control and power management. The goal: improved energy conservation across its campus.

IT pros continue to lose jobs
Foote Partners' research coupled with U.S. Department of Labor Statistics identifies high-tech areas in which jobs continue to be lost and the bright spots of new employment across the industry

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Application Delivery Controllers for Next-Generation Data Centers
Brocade introduces a new generation of Application Delivery Controllers (ADCs) designed to meet growing demand for application connectivity, virtualization, and operating efficiency. Learn more about Brocade(R) ServerIron(R) intelligent application delivery and traffic management solutions.
Learn more now.


 

July 13, 2009

TOP STORIES | MOST DUGG STORIES

  1. How to use electrical outlets and cheap lasers to steal data
  2. The botnet world is booming
  3. NTIA seeks volunteers to review broadband applications
  4. The 10 dumbest mistakes network managers make
  5. What's driving this university to IPv6? Going green
  6. IT pros continue to lose jobs
  7. Ex-Googler says Chrome OS will be a vastly different OS
  8. Ending exclusivity agreements could change the telecom industry
  9. Why HP ProCurve is dismantling Cisco's market share
  10. Newest IE bug could be next Conficker, says researcher

Meet Visualization Requirements with Ease
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Register for this Live Webcast scheduled for Wednesday, July 15 at 2:00 p.m. EDT/11:00 a.m. PDT, to learn how. Meet data visualization requirements faster and with less development by making BIRT web output interactive.
Join us for this Live event



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: