All the abstracts are from the searchsecurity.bitpipe.com website.
Accelerating PCI Compliance with Log Management and Intelligence.
Posted: 19 Sep 2008
Published: 19 Sep 2008
Format: PDF
Length: 6 Page(s)
ABSTRACT:
Today, all service providers and retailers that process, store or transmit cardholder data have a fiduciary responsibility to protect that data. As such, they must comply with a diverse range of regulations and industry mandates. One of the most important for the service provider and retailer is the Payment Card Industry Data Security Standard (PCI DSS), which sets forth 12 requirements for IT controls to ensure data security and protection. However, retailers both large and small face tremendous challenges in implementing policies and controls that enable PCI compliance, and the task of implementing best practices can be overwhelming.
Executive Summary: How to Achieve Comprehensive Network Security.
Posted: 16 Sep 2008
Published: 16 Sep 2008
Format: PDF
Length: 14 Page(s)
ABSTRACT:
Security practitioners need to think about security management along three separate axes – operations, investigations, and compliance reporting. Each of these functions is distinct, and typically involves different organizational hierarchies, which dramatically complicates the challenge of security management. The good news is that all of these management functions ultimately can be driven by a common data set, and that is the opportunity for a security management platform to aggregate this data once and leverage it for a number of suitable purposes.
Unauthorized Applications: Taking Back Control.
Posted: 01 Jul 2008
Published: 01 Dec 2007
Format: PDF
Length: 7 Page(s)
ABSTRACT:
This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
The rapid emergence of Web 2.0 is beginning to redefine how individuals interact with the internet, and the related technologies pose a range of new threats. While there are a number of solutions available that help IT administrators to manage the problem, many require additional investment and, for many organizations, they can be expensive, unwieldy and difficult to maintain. A better solution is one which completely integrates the blocking of unauthorized applications into the existing anti-malware detection and management infrastructure.
Techniques for Transitioning to an IAM Suite.
Posted: 14 Oct 2008
Published: 14 Oct 2008
Format: PDF
Length: 5 Page(s)
ABSTRACT:
Organizations often fill their IAM needs with a variety of disparate techniques and applications, many of which are home grown or built by a variety of third parties. This tip will explain how an organization can ensure a successful transition from multiple products and tools to a single suite. It will look at:
* How to successfully map functionality from old product/tool functions to new ones
* How to evaluate and manage new and existing policy exceptions
* Guidelines for implementing custom connectors with legacy applications
Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It.
Posted: 09 Sep 2008
Published: 09 Sep 2008
Format: PDF
Length: 5 Page(s)
ABSTRACT:
Anonymous proxies are an unseen threat-a student’s or employee’s backdoor to malicious or productivity-sapping sites on the Internet. If your URL filtering solution relies on the old-school URL database/keyword approach, your ship is leaking and you may not see the holes.
With hundreds of new proxy sites created each day, traditional URL filtering just can’t keep up, even when supplemented by standard keyword analysis. What follows is a primer on the problems, the sizable costs and time drain for IT professionals, and a discussion of an effective third-generation solution that goes far beyond the traditional strategy.