Security

ANALYSIS

New PCI Security Standard Falls Short

October is the expected release date for the next version of the PCI Data Security Standard, 1.2. Since the PCI Standard's creation -- to serve as a guideline to help organizations that process card payments, prevent credit card fraud, hacking and various other security vulnerabilities and threats -...

Virus protection giant McAfee is expanding its security empire with the acquisition of Secure Computing. The company announced plans for the purchase Monday morning. It'll pay $465 million, or $5.75 per share, in the merger. The move will no doubt help expand McAfee's suite of security-related produ...

The Payment Card Industry regulation changes that take affect Oct. 1 will mean some additional work by IT departments -- and some new spending. But the PCI Data Security Standard version 1.2 will allow the Payment Card Industry a phase-in period to meet the new rules, according to two security firms...

SUCCESS STORY

Astaro: Tapping the Channel for Security Revenue

Why sell somebody else's product line when you can do a better job offering your own? That was the question that ultimately pushed Jan Hichert, CEO of Astaro, and two other cofounders to develop their own Internet security solutions for a market they viewed as needy of attention -- the small- to med...

Six federal banking regulators, including the U.S. Federal Reserve, FDIC and Office of Thrift Supervision, last November issued final rules clarifying what U.S. banks and credit institutions would have to do to comply with Red Flag provisions of the 2003 Fair and Accurate Credit Transaction Act. The...

Heading the company with perhaps the most recognized acronym in the information security field and following in the footsteps of lightning-rod figure Phil Zimmerman must have both its charms and its challenges. PGP CEO Phil Dunkelberger, however, ranges far and wide in his reflections on how data --...

A troubling up-tick in the frequency of Internet fraud attempts and the growing use of more sophisticated botnets and crimeware is leading a growing number of organizations to enlist the services of specialized Internet anti-fraud security services. Operating in a digital realm beyond the reach of l...

Good con artists make an art of preying on people's fears, hopes, dreams and good intentions, and there's probably no end to the list of con schemes being perpetrated via the Web. A little knowledge can be a dangerous thing, and the Web's openness is proving to be a seduction too strong to resist fo...

Good con artists make an art of preying on people's fears, hopes, dreams and good intentions, and there's probably no end to the list of con schemes being perpetrated via the Web. A little knowledge can be a dangerous thing, and the Web's openness is proving to be a seduction too strong to resist fo...

Good con artists make an art of preying on people's fears, hopes, dreams and good intentions, and there's probably no end to the list of con schemes being perpetrated via the Web. A little knowledge can be a dangerous thing, and the Web's openness is proving to be a seduction too strong to resist fo...

On June 30, data security standards set by the Payment Card Industry became mandatory for organizations that handle online credit card payments. This is a significant milestone in the ongoing push to strengthen online security as these important standards have moved from recommendations to hard and ...

EXPERT ADVICE

Cyber-Security Lessons From the 15th Century

Put down the vendor white papers and turn down the volume on that webinar. If you want to secure your data and pass a PCI audit, take a look at the past -- the long-ago past. Between the ninth and 15th centuries, the castle was the Western world's emblem of strength and security. It enabled small vi...

Two Orange County, Calif., teens have been charged with breaking into their school late at night and using stolen log-ins to hack into its computer system and change their grades. Omar Khan, 18, a student at Tesoro High School in Rancho Santa Margarita, now faces 34 felony counts of altering a publi...

The online security space has been no different than any number of other software categories in its adoption of Software as a Service. However, until recently most of the offerings in this space have been targeted to e-mail protection. That is beginning to change as more and more vendors begin to ro...

QTel is one of the largest telecommunications firms in New York. With a customer base of 10,000 companies, the firm provides small and medium-sized businesses with a comprehensive array of communications products and services, such as fully integrated broadband data and voice services. One of the la...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

E-Commerce Times Channels