
PCI compliance requirement 8: Unique IDs
Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 8: "Assign a unique ID to each person with computer access." To meet PCI compliance Requirement 8, you must:
Information Security Incident Response-Information
Learn how computer forensics and an incident response plan, team and policy can help avoid further disaster after a data security breach or laptop theft.
Conficker-infected machines now number 7 million, Shadowserver finds
The Conficker botnet now consists of 7 million Conficker infected machines, according to the Shadowserver Foundation. Investigators hunt for the Conficker authors, but it is increasingly unlikely ...
Database Security Management-Enterprise Data Protection
Learn more about database security gateways, database encryption, issues, threats, software, security gateways, how to detect database vulnerabilities.
TechTarget Deutschland – Deutschsprachiges Informationsnetzwerk ...
Unabhängige Experten bieten Einblicke in führende Technologien Unser Netzwerk aus mehr als 750 unabhängigen Fachautoren und Experten liefert detaillierte, unvoreingenommene Einblicke ...
Preventing Data Theft, Combating Internal Threats
Jan 1, 2006 · Discover how to protect sensitive data and prevent internal threats and hacker attacks with several methods such as encryption and employee monitoring.
Unpatched vulnerability discovered in Microsoft SQL Server
Sep 2, 2009 · An unpatched vulnerability in Microsoft SQL Server 2000, 2005 and 2008 has been announced. The flaw exposes user credentials and application credentials stored in memory as …
Spy-nux update: NSA SELinux draws interest from open source …
Everyone knows the NSA collects and analyzes signals intelligence. Its lesser-known mission is providing infosec services, including computer security research, to government agencies.
How to protect sensitive data when executives travel abroad
Expert Nick Lewis discusses the risk of data theft when enterprise executives travel abroad and provides tips on how to protect sensitive data.