Compliance News AlertThis newsletter is sponsored by Secure ComputingNetwork World's Standards and Regulations News Alert, 11/16/07A guide to practical PCI compliance, 11/15/07: Myriad merchants find themselves at the end of the PCI compliance barrel and are spending significant amounts of time, money and effort in achieving PCI compliance. Advice from companies that have been there can help smooth your path. Curious cast of characters to vie for spectrum, 11/14/07: We’ll know on Dec. 3 who has filed to bid in the January auctions for blocks of 700MHz U.S. spectrum, frequently called the “beachfront property” of wireless because of its excellent propagation characteristics. House passes bill to streamline VoIP 911 service, 11/14/07: The U.S. House of Representatives has passed a bill designed to streamline VOIP providers' connections to emergency dialing 911 networks.
You really should pay attention to the FRCP, 11/15/07: In my discussions with senior people at a couple of archiving vendors, they both noted that lots of their prospects are not familiar with the new amendments to the Federal Rules of Civil Procedure (FRCP), despite the fact that these changes went into effect nearly a year ago. Sun to buy ERM vendor Vaau, 11/13/07: Sun said Tuesday it plans to buy Vaau, a Torrance, Calif.,-based vendor of enterprise role management and identity-compliance software. Credit card transaction security fortified by new risk assessment system, 11/09/07: Researchers Friday announced a bulked-up vulnerability risk assessment system that they say will help ensure the security of credit card transactions. The Common Vulnerability Scoring System (CVSS) Version 2 was coauthored this year by researchers at the National Institute of Standards and Technology and Carnegie Mellon University in collaboration with 23 other organizations. NIST calls for a new security ‘hash’ algorithm, 11/09/07: The National Institute of Standards and Technology (NIST) this week opened a competition to develop a new cryptographic hash algorithm, a tool that converts a file, message or block of data to a short fingerprint for use in digital signatures, message authentication and other computer security applications. Such hash algorithms are ultimately one of the key security technologies for federal and public systems. Editor's note: Starting the week of Nov. 19, subscribers to the HTML version of this newsletter will notice some enhancements to the layout that will provide you with easier and clearer access to a wider range of resources at Network World. We hope you enjoy the enhancements and we thank you for reading Network World newsletters. |
Contact the author: Contact Site Editor Jeff Caruso This newsletter is sponsored by Secure ComputingBONUS FEATURE90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds. Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount) PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment