Friday, August 12, 2011

Visa to make it easier for merchants to adopt chip-based card payments

When a Cloud Service Vanishes: How to Protect Your Data | Top 8 ways feds (and corporate users) can take advantage of green IT

Network World Compliance

Forward this to a Friend >>>


Visa to make it easier for merchants to adopt chip-based card payments
Visa today announced plans that will let qualifying merchants in the U.S. eliminate the need to annually validate their compliance with the Payment Card Industry (PCI) data security standard. Read More


WHITE PAPER: Akamai Technologies, Inc.

Taming the Cloud
This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now

WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

When a Cloud Service Vanishes: How to Protect Your Data
More and more, we rely on Web services as a matter of course. The key word is rely: We assume that the data we upload to, say, a photo-hosting account or blog service today will still be there tomorrow. In large part, that's because we assume the services themselves will still be there tomorrow. Read More

Top 8 ways feds (and corporate users) can take advantage of green IT
How does the federal government go about implementing green IT? According to a report out today from the Government Accountability Office, the feds have adopted a number of practices that are useful not just for government IT but all manner of private and public company IT groups as well. These include everything from dedicated funding for green products, to improved employee training and reducing use of paper. Read More

Black Hat: Apple does well but Microsoft does better with enterprise security
While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, researchers at Black Hat say. While not recommended for corporate use unless it's in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems. Read More


WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Wall Street: Software More Valuable Than Oil
The tech industry's answer to this week's stock market roller coaster was delivered on Tuesday by Apple Inc, which briefly surpassed Exxon Mobil as the most valuable company in the U.S. Read More

German court's ruling may pose long-term concerns over Android
A German court's decision to bar distribution of Samsung's Android-based Galaxy Tab 10.1 in most of Europe shocked many. It also raises some long-term licensing worries for Android globally. Read More

Cyber-espionage attacks threaten corporate data in new unrelenting ways
Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses. Read More


WHITE PAPER: Citrix Systems

Case study: Getting started with desktop virtualization
The promise of virtualized desktops is widely recognized and desktop virtualization is topping most IT departments' priority lists. But while the "why" of desktop virtualization is clear, it's the "how" that is most challenging. Follow one customer's journey to a more agile and secure business environment. Learn more.>>

Defcon: The security penetration testing quagmire
The relationship between CISOs and security penetration testers is anything but clear cut and raises ethical issues for both parties, a Defcon crowd heard from a former CISO. Read More

Augmented Reality Research: 'Offline to Online Recognition'
At the Black Hat security conference, Carnegie Mellon University researchers Alessandro Acquisti, Ralph Gross and Fred Stutzman presented "Faces of Facebook: Privacy in the Age of Augmented Reality" [PDF]. During their research, they took photos of students with a web cam and then used facial recognition software to compare the photos with Facebook to get students' names. Read More

NuCaptcha Improves Integration of CAPTCHA System
A company that makes a security product designed to thwart problems such as comment spam has added new security and customization features for website owners. Read More

Improve Your Security Leadership with One Lesson From Improv
"Your job is to make your partner look like a rock star." Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

4 reasons Windows Phone 7 will eventually beat iPhone and Android
Here are four reasons why Microsoft will be a major smartphone player in a few years. And three reasons it won't.

MOST-READ STORIES

  1. IBM says PC going way of vacuum tube and typewriter
  2. Facebook security practices questioned after Anonymous threat
  3. Hosted productivity suites: Google Apps or Microsoft Office 365?
  4. DARPA set to blast Falcon Mach 20 test flight
  5. Steer your career to the cloud
  6. How is the Cisco 76% off Nexus sale going over with customers?
  7. 10 scariest hacks from Black Hat and Defcon
  8. Microsoft makes more money on cloud-based Exchange than legacy email
  9. Did Google+ ban cleavage-snuggling LEGO stormtrooper?
  10. 10 cloud career skills

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment