www.fgks.org   »   [go: up one dir, main page]

Editorial Webcast Archive

Getting PCI compliance and IT security right

The Payment Card Industry's Data Security Standard (DSS) is known as one of the most prescriptive industry regulations in the marketplace. Yet, even with all the details provided on ways to keep critical corporate assets secure, while, at the same time, get compliant with DSS, it still proves confounding to many executive leaders. Questions around the proper technologies to implement, the best strategies to focus on or the right security measures for newer IT technologies now being adopted by many organizations still abound.
 

SC Magazine 20/20: Different day, same story

Weaknesses in the software and applications used by corporations are the prime source for hackers to breach infrastructures, steal choice critical data and turn a profit in the sale or use of it. The exploitation of vulnerabilities that crop up because of corrupted websites or malicious content isn't new, but there are various ways to confront the problems.
 

SC Magazine 20/20: Repelling intruders

Increasingly, attackers are having success by targeting weaknesses within client-oriented applications, exploiting these weaknesses through corrupted web sites and malicious content.IBM's Jack Danahy reviews some of the newer threats over the last several months and discusses ways to mitigate against them.
 

Cyberespionage: Myth versus reality

The media is chock full of news detailing incidents of cyberespionage, such as what China is accused of doing with IPs based in the United States and how criminals are infiltrating systems and stealing not just money, but patented trade secrets. And then, of course, there are attacks on the government. But, what the news reports don't reveal are the facts behind this growing criminal and state-sponsored trend.
 

Averting data breaches in a bad economy

Security budgets are holding their own in a tough economy, but IT security personnel charged with protecting networks and company information face increasing responsibilities - from fears of having the company's brand tarnished by a data breach, compliance demands, threats from insiders anxious about losing their jobs, and a slew of other drivers.
 

SC Magazine 20/20: The better CSO

In this webcast, we learn what defines successful CSOs in 2010 as they battle tightened budgets, a sophisticated threat landscape and continued compliance hurdles.
 

SC Magazine 20/20: Security impacts of virtualization

In this special webcast, we find out just how cybercriminals are taking advantage of unprotected virtual environments and what practical steps companies can take to protect against these.
 

SC Magazine 20/20: Evolution of crime

SC Magazine is pleased to introduce a unique webcast series celebrating its 20th Anniversary this year. The free 20-minute webcasts will feature a member of the SC Magazine editorial team in conversation with various industry thought leaders discussing the past, present and future of IT security.