Results for the tag,

 

Data Security

Data Security: Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of Information security. (Source: Wikipedia)

An Introduction to becoming PCI Compliant


Section: Research
This white paper discusses the background of the Payment Card Industry Data Security Standard (PCI DSS), its commercial and technological implications. It includes a case study of implementing the PCI DSS Standard and how this experience could help you to reduce lead times, lower audit costs and reduce infrastructure expenditure for your own business’s PCI compliance programme. Every merchant that processes card payments and retains card payment d ...   read more

Unifying Data Encryption


Section: Research
With the growing emphasis on the need to protect sensitive data, encryption has become a focus of interest for organisations worldwide. Yet data encryption has long had its challenges in deployment. If you are responsible for the protection of sensitive information in a Linux environment and often find yourself wondering which way to turn when it comes to simple transparent and unified data encryption, this paper will interest you.
  read more

Data Protection Basics


Section: Research
This research is for those who are interested in finding out more about achieving reliable data protection with a maximum of cost efficiency. The research is independently authored by Freeform Dynamics and sponsored by Fujitsu, covering the following topics: -  Data protection: Why aren’t we there yet? -  Why should you be thinking about data protection? -  Mapping out the requirements -  Data protection technology
  read more

The Data Sharing Paradox


Section: Research
Small businesses acknowledge that enabling access to data for remote employees and users from external organisations is fundamental to ensuring the on-going efficiency of the processes that drive their businesses. However, they also worry about the risks involved. This report looks at the degree to which small businesses are sharing data today, the ways in which they are doing so and the real and perceived risks. It goes on to look at how these risks can be mitigated and draws o ...   read more

2012 Data Breach Investigations Report


Section: Research
An insightful study, packed full of useful, well-presented data on information security breaches covering a dataset of 855 confirmed security breaches accounting for a combined 174 million compromised records. Complied with the collaboration of enforcement agencies from around the world, including the US Secret Service, Verizon’s 2012 report shows that many security breaches are the results of more than one threat action (malware, hacking, social, misuse, physic ...   read more

A Buyers Guide to Cloud Services


Section: Research
In the UK today over 50 per cent of organisations have formally utilised at least one Cloud service and satisfaction levels relating to that experience grew to an astonishing 96 per cent by the end of 2011. Furthermore, 85 per cent of IT Executives stated that they now formally considered Cloud as a viable option for delivering new IT projects within their wider IT strategy, signalling that the technical model has established a mainstream status among the profession. What ...   read more

A Value Proposition for IT Security


Section: Research
IT departments are facing three big issues when it comes to protecting the data created and stored on the systems they manage. First, the value of the data is often only realised when it is legitimately shared in some way; second, that sharing is increasingly taking place across public networks and third, the users doing the sharing are doing so on a growing diversity of devices in locations that are convenient to them. Whilst the three issues hel ...   read more

Disaster Recovery in European SMBs


Section: Research
This research report looks at the attitudes of small and mid-sized organisations (with 50 to 250, and 250 to 1000 employees respectively), to disaster recovery (DR), and the role that various IT solutions play. The input was gathered via telephone interviews with 160 small and mid-sized businesses (SMBs) across the United Kingdom, France and Germany (see Appendix A for more details).  "Disaster recovery? is a term widely marketed by IT ven ...   read more

Customer Records Remain Primary Target in Data Breach Efforts


Section: Articles
There exists a certain contingent of cybercriminals which perpetrates computer break-ins to make political statements, to demonstrate their prowess in front of their peers, or just for the thrill of it. But bored hackers living in their parents’ basements make up only a small percentage; according to a Trustwave 2012 Global Security Report from Trustwave Spider Labs, 89 percent of their investigations involved the theft of customer records. Today, hackers and cybercriminals are in it for ...   read more

Nat West Failure - What can banks learn from Cloud Service Providers?


Section: Articles
The outage of Nat West's systems has been going on for six days now and the firm is being criticised for its handling of the situation and how it has communicated with its customers. Nat West is finding, to its cost, that its initial policy of giving messages of reassurance to customers is not enough. People need to hear what has gone wrong, how it will be fixed and how long that fix will take. At this point Nat West should be looking to the examples set out among the cloud ...   read more

PCI compliance and the public cloud


Section: Articles
Public perception of how safe credit card and identity information is when placing an order over the Internet has swung from outright suspicion and fear, to acceptance. Internet transactions are at an all-time high especially during the holiday season, and the relatively new phenomenon of "Cyber Monday” has catapulted Internet commerce to the point where merchants now depend ...   read more

Protecting Sensitive Data is Number One Security Priority


Section: Articles
With an explosion of data breaches in recent years, the protection of sensitive information has become a top priority for security organisations worldwide. According to the Privacy Rights Clearinghouse, more than 535 million records have been breached in 2,651 incidents made public since 2005.1 Attackers have targeted virtually the entire gamut of sensitive content, from personal financial account data to intellectual property and high-value information of concern to the most senior lev ...   read more

The commercial implications of PCI


Section: Articles
Ultimately there is no escape from PCI. Whether you are a sophisticated multinational retailer or a small business that accepts card payments – online or offline, it is widely expected that much more rigorous enforcement will be commonplace from 2012.   Technologies and strategies for dealing with PCI are still catching up, although technolog ...   read more

What is PCI?


Section: Articles
Every merchant that processes card payments and retains card payment details must adopt the Payment Card Industry Data Security Standard (PCI DSS).  Failure to do so can result in merchants being subject to substantial fines, higher transaction costs or ultimately the suspension of banking facilities.   A single retailer, or merchant, can process millions payment card transactions each year. If an unauthorised route is found into that merchant’s ...   read more

“Bouncer” Phishing Kit 'Laser-targets' Victims


Section: News
A new phishing kit has been discovered by security experts at RSA which targets its victims specifically, depending on their computer set-up and email address. RSA report  that phishing attacks grew again last year, a huge 59% higher than 2011, at a cost to the global economy of $1.5 ...   read more

10% of all IT Security to be Delivered in the Cloud by 2015


Section: News
The cloud-based security technology industry will account for 10% of all IT enterprise security by the year 2015, according to the latest research from Gartner. Cloud is driving changes in the market landscape around a number of key areas, such as secure email and web gateways and it’s thought that by 2016, the cloud-based security services market will be worth around $4.2bn. "Demand remains high from buyers looking to cloud-based security services to address a lack of ...   read more

ACTA May Never See Light of Day


Section: News
Neelie Kroes, Vice-President of the European Commission, has all but confirmed that the controversial anti-piracy bill ACTA may never see the light of day, and is unlikely to be passed as law. Kroes was speaking at Friday's Digital Agenda Internet Freedom Re:publica conference "The European public on the Net” in Berlin. In her speech, she outlined the benefits of a free and open web to innovation and said that we must "recognise rights and responsibilities online – for an online ...   read more

Android Platform Fails to Raise Businesses


Section: News
A lack of support from Google is cited as the main reason that many businesses won't be using the Android platform, a survey from Gartner has found. The researchers found that many firms regard Android as being too complex to manage in a survey conducted on mobile device management (MDM) software vendors. 58% of respondents said that they would make use of the iOS platform in the coming year, compared to 20% using Blackberry devices and just 9% considering Android. It's thought ...   read more

Anonymous take down US Sentencing Commission


Section: News
Hackers claiming to be a part of hacktist group Anonymous have attacked the US Sentencing Commission website in protest of the way that fellow hacker Aaron Swartz was treated by the authorities. Mr Swartz, 26, recently took his own life whilst he was awaiting trial for the hacking of online journals, which he claimed was a "political statement”. He was an advocate of internet freedom and whilst he had a history of depression, his friends and family have said that it was the thr ...   read more

Apple iCloud Attacked


Section: News
A US journalist has had his entire ‘digital life’ deleted after Apple’s support team were tricked into resetting his iCloud account. Mat Honan not only lost control and data on all of his Apple devices; an iPhone, iPad and MacBook Air, but the attacker also took over his Twitter, Gizmodo and Google accounts, A hacker later contacted Mr Honan and claimed his victory, but left Honan confused as to how this had taken place as it wasn’t what anyone would consider a ‘hack’ as such. ...   read more

1 2 3 4