Search This Blog

Friday, September 16, 2011

Warning: HIPAA has teeth & will bite over healthcare privacy blunders

Hot products from DEMOfall '11 | Inside Cisco global security operations

Network World Compliance

Forward this to a Friend >>>


Warning: HIPAA has teeth and will bite over healthcare privacy blunders
Healthcare organizations that are performing risk assessments as a way to craft patient-privacy policies might want to consider a new potential attack vector: federal regulators. Read More


WHITE PAPER: GFI Software

Economics of Spam
Email security threats do not discriminate. Whether you're an organization with 50 employees or a global corporation with 50,000, the reality is that spam and viruses can wreak havoc on your business, drain users' productivity and take a major toll on IT resources. Read now

WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

Hot products from DEMOfall '11
New products that help you to screen job applicants, improve customer service and even build yourself a tomb Read More

Inside Cisco global security operations
Cisco's Security Intelligence Operations (SIO) provides threat information, vulnerability analysis, and mitigation solutions to enterprise customers. Staff and resources are at work around the world, including at 11 Threat Operations Centers. Network World visited Cisco's TOC in Austin, Texas, for an inside look at how the distributed security teams come together. Read More

Security pros come clean at Summit on Advanced Persistent Threats
Put about 100 chief information security officers, CIOs and CEOs into a room and what they are willing share about cybersecurity just might surprise you. More information about just what they shared will be revealed soon in a report stemming from a closed-door Summit on Advanced Persistent Threats held in Washington, D.C., in July, where business and government security professionals acknowledged to each other that their organizations had either been hacked through stealthy infiltration to steal valuable sensitive information and intellectual property, or that they wouldn't know it if it had been. Read More

DHS seeks to share top-secret info with banking and finance cybersecurity pros
The Department of Homeland Security works with financial institutions to thwart cyber attacks and plans to do so more and more in the future, according to DHS testimony to Congress, including sharing top secret cyber intelligence. Read More


WHITE PAPER: ADTRAN

Socializing your UC Strategy
Beyond standard cost savings – minimizing a bit of travel or enabling you to consolidate some servers or voicemail systems – UC is really about improving productivity by stitching together various systems employees rely on. Learn more

PCI point-to-point encryption guidelines raise new questions
The PCI Security Standards Council today is expected to issue guidelines on use of point-to-point encryption in protecting sensitive payment card data, but the narrow approach — which is focused on hardware — is raising questions. Read More

Windows 8 will run from USB thumb drive
Windows 8 will include a new feature that lets IT administrators provide workers with a portable Windows environment on a USB thumb drive. Read More

Microsoft patches 15 bugs, nukes more SSL certificates
Microsoft today patched 15 vulnerabilities in Windows, Office and other software with five security updates. Read More

Symantec cloud-based service seeks out 'rogue certificates'
Symantec this week introduced what it calls the Symantec Certificate Intelligence Center, a cloud-based service that works with an on-premises software component to keep track of SSL server certificates used by an organization. Read More


WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Senator to businesses: Protect data or pay
Senator Richard Blumenthal says his data breach legislation will deter data breaches. IT security experts have their doubts. Read More

Measuring impact of Wi-Fi denial-of-service attacks
A research team at North Carolina State University has proposed a way of measuring the impact of wireless denial-of-service attacks on Wi-Fi networks. It's a step toward building focused counter-measures that can make such attacks costly to pull off. Read More

U.S. needs to be on-guard for a big cyber-attack
A destructive attack from cyberspace "is coming, in my opinion. It is a question of time. What we don't know is how far out it is," and whether it will target commercial infrastructure, government networks or mobile platforms Army Gen. Keith Alexander told attendees of the "Maneuvering in Cyberspace" symposium this week. Read More

With help from Intel, McAfee links security to the chip
Nearly seven months after Intel shelled out US$7.68 billion for antivirus vendor McAfee, the two companies are offering a glimpse of their future. Read More

SpyEye hacking kit adds Android infection to bag of tricks
The SpyEye hacking toolkit has added an Android component that collects the text messages some banks use as an extra security precaution, a researcher said today. Read More



SLIDESHOWS

Cloud companies to watch: A product sampler
Our Cloud Companies to Watch story gives you the lowdown on a handful of startups looking to make their mark in a business so far dominated by the likes of Amazon, Google, Rackspace and VMware. Here's a closer look at some of the products and services being rolled out by these newcomers.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. Buzzblog: Blue screen of death gets a new look in Windows 8
  2. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  3. Windows Server 8: The Microsoft server fork
  4. Enterprise WAN connectivity: MPLS VPN vs. Public Internet
  5. The future holds a mere 15 minutes of anonymity for everyone
  6. What online news looked like on 9/11
  7. Windows Server 8: To the cloud!
  8. It's Programmer Day! ... (is that the best you can do?)
  9. Cisco unveils dual-role data center
  10. Why FCoE is dead, but not buried yet

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: