Results for the tag,

 

Network Security

Network Security: In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.  (Source: Wikipedia)

12 Steps to becoming PCI Compliant


Section: Articles
The Payment Card Industry Data Security Standard (abbreviated to PCI DSS or commonly, just PCI) is a set of 12 requirements designed to secure and protect customer payment data. These 12 requirements of PCI DSS compliance can be quite daunting for any merchant. These are listed below:   Build and Maintain a Secure Network  read more

An Introduction to becoming PCI Compliant


Section: Research
This white paper discusses the background of the Payment Card Industry Data Security Standard (PCI DSS), its commercial and technological implications. It includes a case study of implementing the PCI DSS Standard and how this experience could help you to reduce lead times, lower audit costs and reduce infrastructure expenditure for your own business’s PCI compliance programme. Every merchant that processes card payments and retains card payment d ...   read more

Cisco Study finds Data Protection Biggest Cloud Worry


Section: News
Cisco have published the results of its 2012 Global Cloud Networking survey and has found data protection security is the toughest challenge IT Pros face during the cloud migration process. 72% of those asked said that data protection was their main concern, followed by reliability and availability of cloud applications (67%). The study, titled "Root Canal or Cloud Migration”, also found that more than a quarter of those asked offered the view that it would take longer to migrat ...   read more

Cybercriminals Will Adopt NSA Tactics


Section: News
Security expert Bruce Schneier has warned that cyber crooks will soon have the ability to adopt tactics similar to those used by the NSA at the RSA 2014 Conference taking place in the US this week. "The NSA techniques give about a three to five year lead on what cyber-criminals will do," he said at the security conference in San Francisco.

  read more


D-Link Router Vulnerability to be Fixed by Halloween


Section: News
A backdoor exploit found in several models of domestic router made by D-Link will be closed by Halloween, D-Link say, following revelations that many of the firm’s consumer-grade devices allow unauthorised access to the admin web page that controls the device. On Monday, The Register reported  read more

Facebook Team up with Security Vendors


Section: News
Facebook have teamed up with five leading anti-virus vendors to create Facebook Antivirus Marketplace in an attempt to slow the spread of malware around the site. Microsoft, McAfee, TrendMicro, Sophos and Symantec are the security firms involved and the new page offers cut price and free antivirus solutions to interested surfers. read more

Gartner Predict IT Trade Won't Keep Up With Demand


Section: News
Experts at Gartner have predicted that the IT trade will be unable to keep up with the demand for support, due to the "consumerisation of IT” and the explosion in BYOD (Bring Your Own Device). The sheer volume of smartphones and tablets that will be added to the work place will make it very difficult for both departmental IT managers and IT support companies to keep up. The problem, says Gartner, means that enterprises will have to ...   read more

Saudi Restore Service Following Shamoon Hack


Section: News
As we reported last week, a virus was detected, dubbed Shamoon, which was thought to have attacked the Saudi Aramco energy plant. It’s thought that the malware targeted the whole of the Saudi energy sector but last week it was only confirmed that one plant had been affected. However, Saudi Aramco says that all of its main services have now been restored. The energy company confirmed that it had been hit by a virus on August 15, which affected around 30,000 workstations.

  read more


The commercial implications of PCI


Section: Articles
Ultimately there is no escape from PCI. Whether you are a sophisticated multinational retailer or a small business that accepts card payments – online or offline, it is widely expected that much more rigorous enforcement will be commonplace from 2012.   Technologies and strategies for dealing with PCI are still catching up, although technolog ...   read more

UK will boost cyber security during 2012 Olympics


Section: News
The British government is set to boost cyber security during the 2012 Olympic Games to "unprecedented levels", the country's top security adviser Sir Peter Ricketts has said. A specialist security unit will be set up and it will receive the support of British intelligence agency GCHQ.Speaking to the Times, Mr Ricketts said that China was hit by huge numbers of cyber security threats  read more

Website Survey Shows Many are Insecure


Section: News
A recent survey into the SSL security of the most popular websites has found that almost 52% of them are running compromised security protocols. The survey is the first in what will be an on-going project for the recently formed Trustworthy Internet Movement (TIM). The group are expected to eventually "name and shame” websites that do nothing to address the issue, forcing sites to ensure that their security is tight and up-to-date. The results of the survey will be ...   read more

What is PCI?


Section: Articles
Every merchant that processes card payments and retains card payment details must adopt the Payment Card Industry Data Security Standard (PCI DSS).  Failure to do so can result in merchants being subject to substantial fines, higher transaction costs or ultimately the suspension of banking facilities.   A single retailer, or merchant, can process millions payment card transactions each year. If an unauthorised route is found into that merchant’s ...   read more

1