Friday, July 08, 2011

Mobile payments, PCI DSS compliance: Some clarity

Apple plugs phishing hole on developer website | 12 Terrific Tips for Taking Tech on Vacation

Network World Compliance

Forward this to a Friend >>>


Mobile payments, PCI DSS compliance: Some clarity
Those hoping for mobile payments PCI compliance answers will have to wait a bit longer, the security council says. Read More


WHITE PAPER: Avaya

Social Media in the Contact Center for Dummies
Grasp the opportunities and challenges of working within the new social media market landscape. The book describes the commercial tools, as well as free ones, organizations use to manage the massive stream of information they collect from various social media channels. Read Now

WHITE PAPER: Fluke Networks

Importance of Permanent Link Testing
This white paper is the joint effort of 2 industry leaders of high speed infrastructure cabling and testing, Panduit and Fluke Networks. This technical paper provides a thorough analysis and review of different testing techniques and their associated benefits for high speed permanent links. Learn More Today!

Apple plugs phishing hole on developer website
The hacker group that flagged a vulnerability on an Apple development website, a vulnerability that could have led to phishing attacks against Mac OS X, iPad and iPad developers, says Apple finally fixed the hole that was identified two months ago. Read More

12 Terrific Tips for Taking Tech on Vacation
Going on vacation and worried about running out of juice, scheduling your DVR from the road, or making sure that you can see your Amazon, Hulu Plus and Netflix streaming video while away? Here's some advice. Read More

Better security needs 'more informed patching'
Security firm Secunia finds that the most popular three-dozen programs account for 80 percent of vulnerabilities. Better patching could help security, but not everyone agrees. Read More


WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

New scoring systems for software security: CWSS and CWRAF
Companies get a framework to evaluate software vulnerabilities, as the consequences of failing to patch flaws become clearer. Read More

Hacking team claims NATO server compromised
A group of hackers going by the name of the "Inj3ct0r Team" are claiming they've compromised a server belonging to the North Atlantic Treaty Organization (NATO). Read More

Google+ Privacy: 5 Settings You Need to Know
While Google's new social network, Google+, is barely a week old, it's already received a lot of attention from tech pundits and the social media community. And as with any new online service, understanding how to control your information is essential. Read More


WHITE PAPER: BMC

Benefits of an ITIL Help Desk in the Cloud
You can implement help desk processes based on ITIL easily with reduced up-front costs and automatic upgrades. Used by more than 72,500 companies worldwide, the Force.com platform is the most widely used Cloud platform in the world. Read More

Microsoft: No botnet is indestructible
No botnet is invulnerable, a Microsoft lawyer involved with the Rustock take-down said, countering claims that another botnet was "practically indestructible." Read More

How to live with malware infections
Get used to it: Malware can't be completely blocked or eliminated. But you can manage your PCs, mobile devices, and networks to function despite being infected Read More

Jailbreak artists exploit unpatched Apple iPhone, iPad bugs
Developers today said they used a pair of unpatched vulnerabilities in Apple's iOS to "jailbreak" the iPhone and iPad, including the first-ever hack of the iPad 2. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

Five potential Facebook killers
The social networking scene is constantly in flux. Facebook is at the top of the heap right now, but challengers are springing up all the time, hoping to leverage the next big wave into a lucrative IPO. Here are five social media sites that are creating a buzz.

MOST-READ STORIES

  1. Microsoft: We're not vulnerable to DDoS attacks
  2. Microsoft patent division taking cash from at least 5 Android vendors
  3. Google+ Privacy: 5 settings you need to know
  4. 5 hot social networking sites
  5. Microsoft pays customer $250,000 to use Office 365
  6. IETF mulls IPv6 for home networking
  7. The Microsoft/Android war: Which patents are at stake?
  8. Farewell to the DS-0?
  9. Microsoft, Citrix join VMware at top of Gartner's Magic Quadrant
  10. 12 ways the cloud changes everything

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: