Friday, October 30, 2009

HITECH Act: What you need to know about new data-breach guidelines;The Curse of Cloud Security

The Curse of Cloud Security; Slideshow: 12 biggest data breaches of past 12 months
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Netcordia
rule

The Importance of PCI DSS Compliance
The greatest challenge to PCI DSS compliance resides in monitoring and managing all its specific network requirements, which encompass security firewalls, access and change controls, system updates, configuration changes and testing procedures. Learn how to ensure that your organization achieves and maintains compliance.

Learn more

rule

Spotlight Story
HITECH Act: What you need to know about new data-breach guidelines

Healthcare providers and others handling sensitive patient data are now finding the stakes raised if they suffer a data breach because of a new law known as the "Health Information Technology for Economic and Clinical Health Act," or HITECH Act. Read full story

Related News:

The Curse of Cloud Security
Seventh Annual Global Information Security Survey: Companies are clamoring for services in the cloud. But the biggest problem from a security perspective is that few understand what they're dealing with. (Second of a four-part series)

Slideshow: 12 biggest data breaches of past 12 months
Hackers and lost laptops put personal information at risk

Healthcare organizations find security, privacy cures
Healthcare organizations are energetically seeking cures for managing identity and security in fast-paced hospital environments to help physicians and nurses do their jobs more easily -- and to keep patient data safe.

Companies Seek Social Networking's Promise, But Peril
Social networking sites such as Twitter, Facebook and LinkedIn enhance collaboration but also make it easier than ever for your employees to share customer data and company secrets with outsiders (First of a four-part series).

Data masking secures sensitive data in non-production environments
Sensitive data is a part of every large organization's normal business practice. Allowing sensitive data from production applications to be copied and used for development and testing environments increases the potential for theft, loss or exposure -- thus increasing the organization's risk. Data masking is emerging as a best practice for obfuscating real data so it can be safely used in non-production environments. This helps organizations meet compliance requirements for PCI, HIPAA, GLBA and other data privacy regulations.

Their phone, your headache
Employees want IT to link their personal smartphones to email and other corporate resources, but how do you secure devices that house a mix of peronsal and corporate information? And what happens when those employees quit?

Password Reset Email is New Facebook Virus
Security researchers uncover spoof email with downloadable files that include the Trojan virus Bredolab.

Survey: More Companies Hiring CSOs
Even though the worst economic recessionin decades has compelled companies to spend less on outsourced security services and do more in-house, security budgets appear to be holding steady. And more of companies are employing a chief security officer.

Five Things You Should Know About Windows 7 Security
Microsoft says Windows 7 is the most secure version of the Windows operating system ever developed. Big deal, right? I am pretty sure that Microsoft has made that claim for every new version of Microsoft Windows in the past 15 years, and that it is a valid claim.

Symantec ties DLP software to third-party security tools
Symantec has updated its Data-Loss Prevention Suite so that if the software finds a data issue that needs fixing, it can apply third-party encryption and digital-rights management (DRM) controls to the problem.

Privacy: Why Google Social Search Gives Me The Creeps
Has Google started following us around? It's new Google Social Search feature, going live today, sure feels like it. And hints at what Google can do both for and to you with all the information it has collected.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More


IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.
Learn more

 

October 30, 2009

MOST-READ STORIES

  1. Motorola Droid vs. Apple iPhone 3GS: finally, a contender?
  2. They're kicking our butts at Trivial Pursuit
  3. 12 mad science projects that could shake the world
  4. Microsoft Linux: Why one free software advocate wants it
  5. Password Reset Email is new Facebook virus
  6. Internet phone systems become the fraudster's tool
  7. Verizon's Motorola Droid arrives Nov. 6
  8. Tech: 9 things I still hate about you
  9. Verizon fires shot across iPhone's bow with Droid smartphone
  10. EFF fights 'censorship' with Takedown Hall of Shame

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process.
Click here.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment