Tuesday, December 2, 2014

5 ways PCI is will be more security-conscious in 2015

  10 deadliest differences of state-sponsored attacks | 5 ways PCI is will be more security-conscious in 2015

 
  ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


8 holiday scams and mistakes to avoid
You're not the only one feeling merry and bright this holiday season - so are the criminals! This time of year provides them with plenty of opportunities for Scrooge-worthy scams. Here's how to ensure all they'll get is coal in their stocking. Read More
 


: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

: WhiteHat Security, Inc.
 
Application Security eGuide
In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses. Learn more >>

10 deadliest differences of state-sponsored attacks
There are some key differences about attacks that originate with foreign governments, and ignoring these differences could prove deadly. Read More
 

5 ways PCI is will be more security-conscious in 2015
The newest Payment Card Industry Data Security Standard was released this month, PCI DSS 3.0, and it is all about security instead of compliance. Read More
 

Siemens patches critical SCADA flaws likely exploited in recent attacks
Siemens released security updates for several of its SCADA (supervisory control and data acquisition) products for industrial environments, in order to fix critical vulnerabilities that may have been exploited in recent attacks.One of the vulnerabilities allows unauthenticated attackers to remotely execute arbitrary code on a Siemens SIMATIC WinCC SCADA server by sending specially crafted packets to it. The flaw received the maximum severity score of 10 in the Common Vulnerability Scoring System and can lead to a full system compromise.The other vulnerability can also be exploited by unauthenticated attackers by sending specially crafted packets, but to extract arbitrary files from the WinCC server. The flaw has a CVSS score of 7.8.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Samsung

Secure Mobility Myth Buster
As organizations try to make sense of the Secure Mobility cacophony, they most often encounter a collection of confusing and conflicting myths instead of useful information to guide key evaluation and acquisition decisions. This document reviews the more common myths and misconceptions about secure mobility and EMM. Learn More

Intel buys identity management company to combat password fatigue
Intel is strengthening its effort to reduce what it calls the "pain of passwords" by acquiring PasswordBox, a Canadian company that offers an online identity manager designed to let users log on to a range of websites and services with just one click.PasswordBox lets users store login credentials in what the company calls a virtual safety deposit box. When surfing the Web, users can click on the sites they want to login to and PasswordBox handles the login.The tool, which has over 14 million downloads, will become a part of the Safe Identity organization within Intel's Security Group, the company said Monday.Intel Security is planning to use PasswordBox's one-click login system for mobile devices and browsers to reduce what it calls "password fatigue."To read this article in full or to leave a comment, please click here Read More
 

Sony working to remove stolen films from file-sharing sites
Sony Pictures said it's cooperating with law enforcement to address the incident. Read More
 

BlackBerry's deal to buy voice crypto company Secusmart blessed by German government
The deal will let BlackBerry step up its cross-platform push with better security. Read More
 

Officials seize 292 domain names to protect consumers during holiday season
Since 2012, law enforcement officials have seized 1829 sites that sell counterfeit goods Read More
 

 

BECOME AN ITWORLD INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 7 tips for landing a job at a coding competition
 

- Data analytics scores marketing wins for the Texas Rangers
 

- Getting started with power-line networking

SALARY SURVEY

What's your earning power? How does it compare with your peers'?
 
With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.