June 27, 2012 - (Free Research) This paper examines how SAP's latest analytics solutions can analyze multiple databases in real-time to identify and prevent improper government payments before they happen. Read on to learn how government agencies can leverage this technology to speed up the process of accessing multiple data sources, reduce the burden on IT staff and much more.
November 27, 2012 - (Free Research) In this week's Computer Weekly, we reveal our annual UKtech50 list of the 50 most influential people in UK IT, and interview the winner, Warren East, CEO of chip design firm ARM. Also in this issue, we conclude our buyer's guide to infrastructure as a service with an in-depth analysis of Microsoft's Azure cloud platform. Read the issue now.
February 14, 2011 - (Free Research) The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.
July 21, 2010 - (Free Research) The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
May 30, 2012 - (Free Research) This exclusive report for Computer Weekly readers by Juniper Research, offers a comprehensive briefing for senior IT professionals on the opportunities for NFC mobile payment technology, markets and trends.
July 26, 2010 - (Free Research) Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
November 2011 - (Free Research) In this week's Computer Weekly, we hear from Visa Europe CIO Steve Chambers on the technology behind the credit card transactions that retailers rely on. We examine the challenges facing the government's G-Cloud project; and we ask how Microsoft will cope when customers no longer want to purchase software licences. Download the new issue now.
August 2009 - (Free Research) PCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance.
August 2010 - (Free Research) When Bill Green spelled out his vision for Accenture in a rare interview shortly after taking over as chief executive six years ago, he said the company would “dream up and build services so powerful and so exceptional that they will be required to compete in any industry, from financial services to manufacturing”.
February 2010 - (Free Research) High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
June 2012 - (Free Research) <p>China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals.</p>
May 2012 - (Free Research) This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital?
June 2010 - (Free Research) Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices.
March 2011 - (Free Research) In this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage.
by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
August 2008 - (Free Research) This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
June 2010 - (Free Research) Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.
February 2010 - (Free Research) Read this expert e-guide to get tips on establishing a process for logging activity and tying records to users, learn three main requirements for testing security controls, and find out how to implement PCI network segmentation and how it may ease PCI compliance for your organization.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.