Friday, July 17, 2009

PCI council publishes wireless security guidelines for payment cards

Solving the DLP Puzzle: Ways Employees Spill Sensitive Data; Cisco: SMS, Smartphone Attacks on the Rise
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM NWW
rule

Unified Communications Information Kit
Get the inside track on advanced communications and collaboration solutions from IBM with our complimentary Information Kit. Learn how to reduce your communication costs, consolidate servers, boost productivity and increase your competitive advantage.

rule

Spotlight Story
PCI council publishes wireless security guidelines for payment cards

Any business accepting credit and debit cards -- and using or considering wireless LANs -- should carefully review the recommendations for use of 802.11 wireless access points that are detailed in the guidelines issued Wednesday by the Payment Card Industry Security Standards Council. Read full story

Related News:

Solving the DLP Puzzle: Ways Employees Spill Sensitive Data
A company can buy every top-of-the-line security product known to man, but it won't make a difference for data loss prevention (DLP) unless end users are educated on their own role. Technology is indeed critical to DLP, as we showed in " Solving the DLP Puzzle: 5 Technologies That Will Help." But security experts say user awareness is key to keeping sensitive data safe from online predators.

Cisco: SMS, Smartphone Attacks on the Rise
New research released today by Cisco warns criminals are rapidly adapting to a more modern economy and continue to find new ways to exploit people with mobile phones and through social networks and text messages. The Cisco 2009 Midyear Security Report finds that much like a successful business, the criminal underground works together to understand and take advantage of the evolving behaviors of the demographic they are trying to fleece. As part of this strategy, cyber criminals quickly seize upon current events, such as swine flu and the recent death of Michael Jackson, in order to fool people into phishing scams or to spam advertising for preventive drugs and links to fake pharmacies.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Webinar: 5 Architecture Issues that Impact BES performance
re your end users experiencing slow mail delivery? Are there some days where email gets delivered to the BlackBerry device before Outlook, and other days where email doesn't get delivered at all? This technical webinar will identify critical log file errors, performance counters, and configurations to pay close attention to when optimizing BES server performance.
Read Now


 

July 17, 2009

TOP STORIES | MOST DUGG STORIES

  1. Best Buy calls Twitter a job qualification
  2. Eight real-life robots that could kill us all
  3. How to use electrical outlets and cheap lasers to steal data
  4. Invisible IPv6 traffic poses serious network threat
  5. Cisco expected to guillotine more employees this Thursday
  6. Test: Best hypervisors for the desktop
  7. 11 security companies to watch
  8. Cisco multimillionaire goes broke, loses $300 million fortune
  9. Google opens attack on Lotus Notes install base
  10. How many Twitter followers does it take to get a job?

World-Class Security for the Mid-Size Organization
Secure your IT environment like the big IT shops. Discover a cost-effective appliance that includes built-in rules and reports for solving critical security and compliance problems. Gain the visibility you need into security incidents without spending too much on new security solutions or staff.
Get all of the Details Now



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment