Search This Blog

Monday, August 16, 2010

Make sure your voice is heard

Heartland denies systems involved in new data breach | Do you need network security and privacy loss insurance?

Network World Security: Identity Management

Forward this to a Friend >>>


Make sure your voice is heard
The National Institute of Standards and Technology and RTI International have launched a critical survey on the economics of access control targeted towards IT security, audit and compliance professionals. Read More


RESOURCE COMPLIMENTS OF: Quest Software

Choosing the Right Active Directory Bridge Solution
What do you need to know when evaluating AD bridge solutions? In this Quest Software white paper, discover the questions to ask when choosing the best solution for your company. Don't waste time and money with systems that don't play well together! Read More

WHITE PAPER: Qwest

Data Protection and Your Customers
Many retailers are creating dynamic, immersive experiences that make shopping more convenient and enjoyable. But these interactions also create the potential for a security breach. Find out what's required for Payment Card Industry (PCI) compliance and the steps you should take to safeguard your customer's data—and trust. Read Now.

Heartland denies systems involved in new data breach
Heartland Payment Systems, which last year suffered the largest-ever data breach involving payment card data, is downplaying reports out linking the payment processor to a data breach at a restaurant chain in Austin, Texas. Read More

Do you need network security and privacy loss insurance?
If your business manages personal information about health or finances, a security breach can cost millions. HITECH and other regulations not only apply fines, but they require disclosure and notification of those affected. In some cases, companies must pay for free credit reports too. These costs can range from $80 to $200 per compromised record. The problem for many companies is the sheer volume of information that can be compromised in a single breach. If you lose 5,000, 50,000 or 500,000 records, the math may mean bankruptcy. Fortunately, you can now get insurance to cover these risks. Read More

Group wants to protect privacy as electronic toll systems grow
WASHINGTON, DC -- Looking to head off privacy problems with the increased use of transponders in cars, particularly in Europe, a group of researchers is touting a cryptographic protocol that would protect the private information generated by the devices. Read More


WHITE PAPER: Tripwire

Cyberwar Threats: New Security Strategies for Governments
Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar. Read More!

Do we need a Federal law for electronics recycling?
A move could be afoot to get the Federal government behind a national law that would standardize the way electronic equipment is disposed of and or recycled. Read More

FTC busts domain name scammers
The Federal Trade Commission said today that it had permanently killed the operations of a group that it said posed as domain name registrars and convinced thousands of US consumers, small businesses and non-profit organizations to pay bogus bills by leading them to believe they would lose their Web site addresses if they didn't. Read More

Measure and manage the risk inherent in your IT infrastructure
You've got a limited budget to spend on IT security measures. Wouldn't it be nice to have an advisor tell you precisely how to apply your resources to improve the security of your infrastructure and reduce the inherent risks to your business? Prevari's Technology Risk Manager uses predictive analytics to show you your risk level and what you can do to mitigate the risks. Read More


WHITE PAPER: Qwest

Security Strategies for Converged Networks
Convergence enables tremendous productivity gains and efficiencies, but merging previously disparate networks and applications can pose significant security risks. To prepare, IT organizations need to assess potential risks and take a holistic approach to building security into the network infrastructure. Read Now.

Revisions to credit card security standard on the way
The Payment Card Industry Data Security Standard 2.0 will be out at the beginning of September. The standard governs how businesses must guard sensitive cardholder information on their networks. Read More

'Dangerous' iPhone exploit code goes public
Minutes after Apple issued a security update, the maker of a 10-day-old jailbreak exploit released code that others could put to use hijacking iPhones, iPod Touches and iPads. Read More

Update iOS Now, Malicious Attacks Coming Soon
Apple released updates yesterday for iOS on the iPhone, iPad, and iPod Touch to patch flaws that were exploited by the JailbreakMe hack. The author of the JailbreakMe hack responded by making the JailbreakMe source code public--providing malicious developers with the tools they need to attack the iPhone or iPad. The race is on to apply the Apple iOS updates before malicious exploits start circulating. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Supersize your WAN
Dual-WAN routers have come a long way. WAN connections are easier to establish, and all units we tested have configurable load balancing. The performance increase, not to mention the redundant Internet connections that all but guarantee uptime, should put these dual-WAN routers at the top of the shopping list for every small business that needs a router.

The recent history of governments vs. the Internet
Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. Here are some doozies.

MOST-READ STORIES

  1. Dual-core smartphones on the horizon
  2. Stupid data center tricks
  3. Smartphone free-for-all: BlackBerry Torch vs. Droid 2 vs. Epic 4G
  4. HP hit with lawsuit over Hurd's departure
  5. 'WiMAX 2' set to be finalized in November
  6. GNOME chief 'embarrassed' by lack of free software Web services
  7. Workarounds: 5 ways employees try to access restricted sites
  8. Microsoft's 2010 software 'most complicated lock-in decision in years'
  9. Eight campus-ready hard drives
  10. Revisions to credit card security standard on the way

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: