Friday, February 08, 2013

Cutting through PCI cloud clutter | 25 techie Valentine's gift ideas

  25 techie Valentine's Day gift ideas | Security-as-a-service gaining popularity
 
  Network World Compliance

Forward this to a Friend >>>


Security standards council cuts through PCI cloud confusion
Can you hold Payment Card Information (PCI) data in a cloud-based service? Yes, but doing so isn't straightforward, so the PCI Security Standards Council has published a guideline that clarifies what approaches compliance-minded businesses can take. Read More


RESOURCE COMPLIMENTS OF: IDG Research

New Survey: Purchase Process of Enterprise Technologies
Tell us about the buying process for enterprise technologies in Network World's Technology Influence Survey! This survey should take about 10 minutes of your time. To thank you, you will have the opportunity to enter a sweepstakes to win a $250 cash prize*! Please be assured your responses are confidential. To participate, click on the link below. *Due to regulations, prize sweepstakes is only open to legal U.S. and Canadian (except Puerto Rico and Quebec) residents, age 18 or older.

WHITE PAPER: Raritan, Inc

Power Distribution in Data Centers
Today's data center managers are being asked to do more with less: to supply more computing power using less energy in a smaller space, while meeting limited budgets and maintaining mission-critical reliability. This white paper focuses on solutions that are successfully meeting these demands. Learn More

25 techie Valentine's Day gift ideas
From subtle geekery to blatantly techie devices, Valentine's Day gifts suit a range of personalities Read More

INSIDER
Security-as-a-service gaining popularity
Security delivered as a cloud service has several benefits, including costs and flexibility, but there are some cautions, too, adopters say. Read More

Google, Microsoft and others putting kibosh on phishing emails
A year after Google, Microsoft and other email heavyweights launched the DMARC program to filter out spoofed email that attackers use for phishing, they say an estimated 60% of the world's email boxes are now safe. Read More

US military needs hackers like Gary McKinnon, says policy analyst
The US Government should consider pardoning Gary McKinnon as part of a campaign to woo people with similar much-needed cyber-skills, influential defence analyst John Arquilla has argued in an article that will make tough reading for the men and women who spent a decade trying to extradite the Briton. Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

Moving to cloud computing is harder, costlier than originally envisioned
A substantial number of businesses say cloud computing security challenges are daunting and the costs higher than they originally thought they would be, according to the Cloud Survey report published today by consultancy KPMG International. Read More

Etsy gets geeky: Techiest homemade arts & crafts
Homemade Xbox soap, Linux diaper cake & more Read More

33 expert tips and tricks for iOS 6
Perhaps you are already an iOS master. Or maybe you consider yourself more of a novice. Either way, we feel confident that at least some of the tips and tricks for iOS 6 that we present below will be new to you. What's more, we hope you love them--and benefit from them--as much as we do. Read More

Android Trojan infects smartphone to launch attack on PC
Kaspersky Lab has discovered the first ever Android malware app that appears to have been designed not to attack the host smartphone but any PCs it is subsequently connected to. Read More


WHITE PAPER: IBM Corporation

A Guide for a Successful ERP Strategy in the Midmarket
Combining an experienced service partner with an informed ERP strategy helps to maximize ROI. This helps midmarket organizations to contain costs, communicate effectively, and improve to grow into more successful organizations. Learn More.

How ADP and Facebook battle bad e-mail
Each day cyber-criminals around the world manage to unleash untold millions of spoofed e-mails that fake well-known brand names to try and fool victims that receive this fraudulent e-mail into opening malware attachments or visiting malware-laden websites. To fight this scourge, security managers at companies like Automatic Data Processing (ADP), and Facebook that want to protect e-mail users and their brand name ramp up defenses against phishing. Read More

Researchers devise new attack techniques against SSL
The developers of many SSL libraries are releasing patches for a vulnerability that could potentially be exploited to recover plaintext information, such as browser authentication cookies, from encrypted communications. Read More

Apparently we can wait: Obama's online privacy effort
It has now been just about a year since the Obama administration put forth its online privacy blueprint. In spite of a title on the announcement that insisted "We Can't Wait," not much has happened since the blueprint was published. Meanwhile, things are heating up on the online privacy front in Europe, and the contrast between the United States and European viewpoints is and is not stark. Read More

2013's 25 Geekiest 25th Anniversaries
A look back at the most memorable tech-related happenings of 1988 Read More

 
 
 

SLIDESHOWS

2013's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1988.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. A giant radio telescope, a small school and Wi-Fi problem

2. Can close source software transition to the GPL successfully?

3. Researchers devise new attack techniques against SSL

4. Hypervisor startup is virtualizing virtualization

5. Which Linux distro is best? Survey says: Slackware

6. iPhoneys: The iPhone 6 and iPhone 5S edition

7. What's up with VMware?

8. Android Trojan infects smartphone to launch attack on PC

9. Microsoft Surface Pro: First look

10. Samsung Galaxy S 4 buzz still white hot

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment