Search This Blog

Thursday, September 22, 2011

Coping with HIPAA regulations: Electronic faxes

An Open Letter To The Information Security Industry: We Live In Amazing Times | Facial recognition security, privacy issues grab FTC attention

Network World Security Strategies

Forward this to a Friend >>>


Coping with HIPAA regulations: Electronic faxes
The Health Insurance Portability and Accountability Act mandates reasonable safeguards in communicating patient medical data from one care-provider to another. In this second of two columns on the subject, we look at alternatives to using the old-fashioned fax machines that can accidentally transmit private data to an unexpected recipient. Read More


WHITE PAPER: Citrix

Research—Accelerate Internet Websites and Applications
Gartner report "How to Accelerate Internet Websites and Applications" is a study of three popular website acceleration techniques: network optimization, front-end optimization and edge caching. Read now

WHITE PAPER: HP & Intel

IDC: Ways to Improve the Branch Office
Well-targeted technology upgrades, coupled with a rigorous program to standardize and improve IT practices at a company's remote locations and headquarters, can deliver substantial business value and could reduce total annual IT costs in the branches by over 30%. Read now

An Open Letter To The Information Security Industry: We Live In Amazing Times
I apologize that this post is not about open source, however I think it was important enough to post up here. Read More

Facial recognition security, privacy issues grab FTC attention
The Federal Trade Commission the week said it will hold a workshop that examines how burgeoning use of facial recognition technology impacts privacy and security. Read More

Prototype system promises 54% smartphone battery life boost
Researchers says they have created a system that can boost battery life by 54% by better managing idle-"listening" times on smartphones or other wireless devices. Read More


WHITE PAPER: Sybase

Sybase® IQ Accelerates Advanced Analytics
The market-leading column-based analytics server, Sybase® IQ offers accurate answers, scalability and speed for your advanced analytics environments. No platform is better suited to help your business analyse, compete and deliver above the competition. Read now

Data-breach insurance caters to small businesses
With the proliferation of data breaches, The Harford insurance company is selling a new data loss insurance aimed at small businesses that might be put at financial risk if they lose valuable and sensitive data. Read More

Social engineering attacks costly for business
Social engineering attacks are widespread, frequent and cost organizations thousands of dollars annually according to new research from security firm Check Point Software Technologies. Read More

Netflix deals with cloud security concerns
As Netflix commits its future to streaming movies to customers, it relies almost exclusively on cloud services for its infrastructure, raising security concerns that require a new way of thinking, the company's cloud security architect says. Read More


WHITE PAPER: Oracle

BPM SOA and Web 2.0: Business Transformation or Train Wreck?
The challenges faced by today's government agencies and commercial operations are many and varied. Fortunately for them, the convergence of a trio of technologies and business practices—business process management (BPM), service-oriented architecture (SOA), and Web 2.0—is providing a solution. Learn more.

Bigger isn't better when it comes to social engineering attacks
When it comes to social engineering attacks, larger companies attract more of them, and when they are victimized it costs more per incident, according to a survey sponsored by Check Point. Read More

1 in 3 in Massachusetts had personal data compromised
Personal information on about a third of Massachusetts residents has been compromised, according to the state's attorney general, citing statistics gleaned from the tough data breach reporting law there. Read More

Internet privacy: Cookies as a weapon
In November 2009 the European Parliament approved a directive on Internet privacy that, among other things, required user opt-in before websites could install cookies on the user's computer. Read More

DigiNotar certificate authority goes bankrupt
The theft of SSL certificates from Dutch certificate authority DigiNotar so undermined trust in the company that it has gone bankrupt. Read More

NASA unbolts open source space applications challenge
NASA today said it would host an open source-based application competition that it hopes will deliver a new generation of software that can address space, weather and economic issues. NASA said it will coordinate with other interested space agencies around the world on an International Space Apps Challenge that will encourage scientists and concerned citizens from all seven continents - and in... Read More



SLIDESHOWS

16 essential Android apps for IT pros
There are hundreds of thousands of Android apps, including many that are useful for IT professionals on the job. These apps can help connect to servers, monitor computers, access databases, analyze the airwaves, scan networks, and serve as a reference. Here are 16 of these apps, most of them free.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Next-gen boot spec could forever lock Linux off Windows 8 PCs
  2. Lync not enterprise-ready, claims Microsoft ISV-turned-rival
  3. Terrorism with your pancakes? FBI, DHS, police raid 7 IHOP restaurants
  4. 15 essential open source tools for Windows admins
  5. Cisco, Microsoft cooperate to bring network-layer management to Hyper-V
  6. Google+ adds search (finally); now anyone can join
  7. Google preps developers for one-size-fits-all Android update
  8. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  9. Has Google's CEO stopped using Google+?
  10. Patent madness! A timeline of Android patent wars

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: