Friday, September 04, 2009

RSA publishes virtualization security, compliance guidelines; Is your health privacy at risk?

Is your health privacy at risk?; Health privacy undermined: Worst breaches of 2009
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM
rule


Companies have relied on perimeter defenses to keep their networks and data secure. Unfortunately, network firewalls and network vulnerability scanners can't defend against application-level attacks. Since so many Web sites contain vulnerabilities, hackers can leverage a relatively simple exploit to gain access to a wealth of sensitive information, such as credit card data, social security numbers and health records. It's more important than ever to examine your Web application security, assess your vulnerability and take action to protect your business.

Click to continue

rule

Spotlight Story
RSA publishes virtualization security, compliance guidelines

RSA today published security and compliance recommendations for virtualization products. The guidelines focus primarily on optimizing use of management and security tools available from VMware parent company EMC and EMC's RSA security division. Read full story

Related News:

Is your health privacy at risk?
The year's worst health information breaches, which compromised millions of patient records, show just how vulnerable health privacy is to hacker attacks.

Health privacy undermined: Worst breaches of 2009
Hospitals, pharmacies and health insurance companies are among the hardest hit when it comes to hacker attacks, stolen laptops, spying employees and other information security mishaps. Healthcare organizations are losing more than just names and Social Security numbers. When their data gets stolen, patients lose the privacy of their medical conditions and treatments while at the same time falling prey to identity theft, medical billing fraud and other criminal schemes. Here's a look at the worst healthcare data breaches of 2009 as recorded by The Privacy Rights Clearinghouse and some of the scary stories behind them.

How to Succeed in a Two-Faced IT Security Job Market
More companies have hired CSOs and CISOs in response to an ever-increasing regulatory compliance load. They are spending less on outsourcing as economic conditions prompt them to handle more security tasks in-house.

Hospital taps Verizon for security review
The Obama Administration's push towards electronic exchange of health information is putting the spotlight on the security of health information held by hospitals, physicians and other healthcare providers.

Five indicted in long-running cybercrime operation
New York prosecutors indicted five Eastern European men on Monday in an extensive credit-card fraud operation that netted the defendants at least US$4 million from some 95,000 stolen card numbers.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Dynamic Security in the Virtualized Data Center Network
Virtual data centers are creating new communications patterns within the network which cannot be secured by conventional, perimeter-oriented designs. Join Juniper Networks for a live Webcast on how to protect your data center's network, extend protection across new data flows, simplify management of policy rules and consolidate separate infrastructures.
Click here to register.


Thinking Beyond Tape: The Case Against Tape Backup
Many companies are already backing up their main and branch office systems to tape, but what they don't understand is just how vulnerable their data and their business remains. This video whitepaper explores the high cost, complexity and potentially dangerous shortcomings of a strategy based only on tape backup.
Learn more.

 

September 04, 2009

TOP STORIES | MOST DUGG STORIES

  1. Raytheon snaps up Internet pioneer BBN Technologies
  2. The 11 most influential microprocessors of all time
  3. Developer denies software to beat Chinese censors is malicious
  4. Cisco, EMC starting new joint venture company?
  5. Wi-Fi encryption cracked in 60 seconds
  6. Half of new servers are virtualized, survey finds
  7. 12 cool ways to donate your PC's spare processing power
  8. Still trying to crack Nazi Enigma messages
  9. Snow Leopard vs. Windows 7
  10. 12 words you can never say in the office

Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the Symark approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment