Friday, March 05, 2010

Average annual cost of PCI compliance audit? $225k

The old privacy versus security debate | Open Identity Exchange backs U.S. gov't privacy guidelines

Network World Compliance Alert

Forward this to a Friend >>>


Average annual cost of PCI compliance audit? $225k
Merchants that undergo network audits to ensure compliance with the Payment Card Industry Data Security Standards are paying an average of $225,000 each year. Read More


WHITE PAPER: St. Bernard

6 Steps to Evaluating Web Filtering
This paper guides you through the pros and cons of a software-based solution vs. an appliance-based filter and advises on considerations ranging from implications of your acceptable use policy to properly authenticating individuals. Read More

E-GUIDE: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps Learn More Now

The old privacy versus security debate
There's been an ongoing debate over the last decade about how best to balance privacy versus security in the context of homeland security. Can the government tap our phones or e-mail accounts in order to thwart a possible terrorist plot? Do we have to open our bags to TSA screeners before we can get on a plane in order to prevent a hijacking? The privacy versus security debate also applies to how we... Read More

Open Identity Exchange backs U.S. gov't privacy guidelines
Google, Equifax, Verizon and others launched the Open Identity Exchange (OIX) this week to support federal government guidelines for online privacy and security. Read More

RSA extends security tools to VMware
EMC's RSA division is embracing the virtualization trend that its VMware spinoff helped kick off, announcing Thursday that three of its core security products will work in VMware virtualized environments. Read More


WHITE PAPER: BeyondTrust

Root Access Risk Control for the Enterprise
Compliance efforts and security concerns have driven businesses to make substantial investments in threat control. In this paper, EMA analysts examine BeyondTrust PowerBroker, a comprehensive solution designed to close these gaps for the enterprise with provable control. Read More

Nero SecurDisc: Improved Security For Optical Storage Media
Nero, makers of optical media-burning software, has announced a new version of its SecurDisc data- protection technology, which should increase your chances of recovering content from damaged CDs, DVDs and Blu-ray Discs. Read More

Protect Data With On-the-Go Drive Encryption
This past January, the health organization Kaiser Permanente reported a theft of an external hard drive from an em­­ployee's car. The hard drive contained data on about 15,500 Northern California patients, including their full names, medical record numbers, and, in some cases, gender, dates of birth, and other info on treatment and care received at Kaiser (but not patients' social security numbers or financial data). Read More

One Man's Life on the Security D-List
At Security B-Sides, infosec author Andrew Hay explains the four pillars for moving from the bottom of the IT security shop to a place of respect, and why getting to the A-list isn't all it's cracked up to be. Read More


WHITE PAPER: Riverbed

WAN Optimization Can Multiply IT Efficiencies
Data center consolidation, regulatory compliance and a more distributed environment are some of the IT initiatives making a comprehensive and robust disaster recovery plan more important than ever before. The Enterprise Strategy Group highlights trends in DR, the role of virtualization and the impact of WAN optimization. Learn more.

Why 41 Percent of You Would Fail a PCI Audit
Miscellaneous news bytes from the RSA 2010 press room: QSAs tell Ponemon Institute that 41 percent of companies would bomb their PCI security audit; hackers industrialize their sinister revolution and VeriSign opens a new compatibility lab. Read More

Researchers find way to zap RSA security scheme
Three University of Michigan computer scientists say they have found a way to exploit a weakness in RSA security technology used to protect everything from media players to smartphones and e-commerce servers. Read More

Former NSA tech chief: I don't trust the cloud
The former National Security Agency technical director told the RSA Conference he doesn't trust cloud services and bluntly admonished vendors for leaving software vulnerabilities unpatched sometimes for years. Read More

Check Point puts VPN in USB stick
Check Point has become the latest vendor to push the USB stick as the road warrior's best friend, announcing a way for business travellers to carry around their office desktop on a single drive. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

7 most useful Firefox add-ons
Some "add-on apps" work well enough to replace a standalone desktop application. Here are seven add-ons that transform Firefox into a fully functioning application.

Fave raves: IT pros' favorite products
We asked readers about their favorite must-have network products and found there's a lot of love for products that can automate manual processes, improve visibility and management, and speed performance for end users. Products that save money are also, not surprisingly, big favorites.

MOST-READ STORIES

  1. New exploit technique nullifies major Windows defense
  2. Ten of the world's strangest social networks
  3. The man behind Microsoft's Windows Phone design
  4. Is Novell worth $2 billion?
  5. Wi-Fi finders let thieves track down hidden laptops
  6. 21 apps Apple doesn't want on your 3.0 iPhone
  7. EMC: Flash could spell doom for Fibre Channel
  8. 7 most useful Firefox add-ons
  9. Microsoft: Don't press F1 key in Windows XP
  10. Novell target of hedge fund's $2 billion takeover bid

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment