Friday, August 13, 2010

Revisions to credit card security standard on the way

  Group wants to protect privacy as electronic toll systems grow | 'Dangerous' iPhone exploit code goes public
 
  Network World Security

Forward this to a Friend >>>


Revisions to credit card security standard on the way
The Payment Card Industry Data Security Standard 2.0 will be out at the beginning of September. The standard governs how businesses must guard sensitive cardholder information on their networks. Read More


WHITE PAPER: MessageLabs

Gartner Magic Quadrant for Secure Email Gateway
This industry report covers the email gateway market. Gartner, Inc. positions Symantec Hosted Services in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention). Read the entire report. Read Now

WEBCAST: Oracle

Getting Started with Identity Compliance
The Burton Group's, Kevin Kampman, provides an overview of the latest technology for identity management. He'll help you sift through key, mandatory requirements and features and functionality that can wait. Kevin offers guidance on how you can get a 360-degree view of users' access and behavior, best practices and a real-world implementation. View Now.

Group wants to protect privacy as electronic toll systems grow
WASHINGTON, DC -- Looking to head off privacy problems with the increased use of transponders in cars, particularly in Europe, a group of researchers is touting a cryptographic protocol that would protect the private information generated by the devices. Read More

'Dangerous' iPhone exploit code goes public
Minutes after Apple issued a security update, the maker of a 10-day-old jailbreak exploit released code that others could put to use hijacking iPhones, iPod Touches and iPads. Read More


WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

Do we need a Federal law for electronics recycling?
A move could be afoot to get the Federal government behind a national law that would standardize the way electronic equipment is disposed of and or recycled. Read More

Update iOS Now, Malicious Attacks Coming Soon
Apple released updates yesterday for iOS on the iPhone, iPad, and iPod Touch to patch flaws that were exploited by the JailbreakMe hack. The author of the JailbreakMe hack responded by making the JailbreakMe source code public--providing malicious developers with the tools they need to attack the iPhone or iPad. The race is on to apply the Apple iOS updates before malicious exploits start circulating. Read More


WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

Do you need network security and privacy loss insurance?
If your business manages personal information about health or finances, a security breach can cost millions. HITECH and other regulations not only apply fines, but they require disclosure and notification of those affected. In some cases, companies must pay for free credit reports too. These costs can range from $80 to $200 per compromised record. The problem for many companies is the sheer volume of information that can be compromised in a single breach. If you lose 5,000, 50,000 or 500,000 records, the math may mean bankruptcy. Fortunately, you can now get insurance to cover these risks. Read More

Early privacy GRC contenders
The privacy governance, risk and compliance niche is a subset of the IT GRC market and is characterized by privacy regulatory mapping, privacy assessments and data inventorying features. The products in the table below are the pioneers. Read More

What Will Symantec Do Next With Verisign?
Symantec's acquisition of the Verisign security assets closed earlier this week. This frees Symantec to tell the world what it bought and what role the Verisign services play. Good thing. Symantec caught a lot of flack for buying a legacy SSL certificates business. In truth, this deal could be much more -- a SaaS authentication and PKI offering to broker trust relationships in B2C and B2B transactions. ... Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Supersize your WAN
Dual-WAN routers have come a long way. WAN connections are easier to establish, and all units we tested have configurable load balancing. The performance increase, not to mention the redundant Internet connections that all but guarantee uptime, should put these dual-WAN routers at the top of the shopping list for every small business that needs a router.

The recent history of governments vs. the Internet
Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. Here are some doozies.

MOST-READ STORIES

  1. Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
  2. Google CEO Schmidt: No anonymity is the future of the Web
  3. Everything you need to know about building solid, reliable networks
  4. 'Dangerous' iPhone exploit code goes public
  5. HP researcher claims to crack compsci complexity conundrum
  6. 10 of the world's funniest tech videos
  7. Microsoft's 30-day forecast: Stormy exploits unexpected
  8. AT&T Wireless chief blesses Verizon-Google proposal
  9. Security blunders 'dumber than dog snot'
  10. 'WiMAX 2' set to be finalized in November

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment