to help enterprise security across Europe
The resource centre for busy senior executives seeking the latest insights into IT Compliance & Privacy issues for major organizations
 
sarbaines oxley ofcom communications regulator
Latest Resources      data protection register
compliance resources privacy resource center

Breaking Global News
Global Compliance and Privacy News
- Breaking News, updated every 30 minutes
•   Compliance, Privacy and Security
•  Money Laundering
•  Phishing
•  Regulatory Issues
•  SOX, Basel 2, MiFID


You Tell Us:
S
S
L

T
E
C
H
N
O
L
O
G
Y
We use SSL Technology for web data entry points:

Always
Sometimes
Never
What is SSL?

News
Are Smartphones Endangering Security? - Wick Hill
Dealing with Internet Security Threats - Ian Kilpatrick
How the New EU Rules on Data Export Affect Companies in and Outside the EU - Thomas Helbing
Farmers' Data Leak Highlights Old Technology Use - Wick Hill
Saving Money with SFTP - Wick Hill
UK Information Commissioner targets firm selling vetting data - Eversheds e80
12 Key Steps to Internet Security - Wick Hill
Telephone Monitoring Legality in the UK - Dechert
Firewall or UTM - Wick Hill
UK Information Commissioner demands mobile device encryption - Eversheds e80
Data loss - liability, reputation and mitigation of risk - Eversheds e80
Phorm, Webwise and OIX - BCS Security Forum
The challenges of PCI DSS compliance - Thales, Russell Fewing
"Quality" Data Vendor Spams us! Editor astounded!
National Gateway Security Survey 2008 - Wick Hill
Unified Threat Management - Watchguard Technologies

news archives
:
0 | 1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 | 11 |
12 | 13
[What is this?]

Industry Blogs
Tim Berners Lee's Blog
Tim Callan's SSL Blog
Davis Wright Tremaine's Privacy & Security Law Blog
Emergent Chaos Blog
Michael Farnum's Blog
Phillip Hallam-Baker's Blog - The dotFuture Manifesto: Internet Crime, Web Services, Philosophy
Stuart King's Security and Risk Management Blog
David Lacey's IT Security Blog
Metasploit Official Blog
Jeff Pettorino's Security Convergence Blog
Jeff Richards's Demand Insights Blog
David Rowe's Risk ManagementBlog
Bruce Schneier's Security Blog
Larry Seltzer's Security Weblog
Mike Spinney's Private Communications Blog
Richard Steinnon's Threat Chaos Blog
The TechWeb Blog
Tim Trent's Marketing by Permission Blog
Rebecca Wong 's DP Thinker Blog

Newsletters
23 February Newsletter
Newsletter Archives are located in "News"

Industry Update
Internet Security Intelligence Briefing - November 2005
Find out the latest trends in e-commerce, web usage & the latest threats from adware/Spyware

Reports
Phorm, Webwise and OIX
- BCS Security Forum

'The Any Era has Arrived, and Everyione has Noticed' - Stratton Sclavos - VeriSign
Identity Security - Time to Share
Malicious code threats - iDefense
Public Alerts - updated as they happen from Stopbadware.org
Public Alerts - updated as they happen from Websense
Public Advisories - updated as they happen, from iDefense
Phoraging - Privacy invasion through the Semantic web: a special report by Mike Davies of VeriSign

Legislation
Privacy Laws & Business International E-news, Issue 57
Privacy Laws & Business UNited Kingdom E-news, Issue 60

Security Reviews
February 2007 - VeriSign Security Review
The security review archive is here

Case Studies
Finance Industry
Case Study Example

A case study on a Finance industry company.

White Papers
VeriSign® Intelligent Infrastructure for the 21st Century
VeriSign® Intelligent Infrastructure for Security
VeriSign® Intelligent Infrastructure: An Overview
Identity Protection Fraud Detection Service - description of the service
Life of a Threat - Video on Threat Management Lifecycle
Optimizing Enterprise Information Security Compliance - Dealing with all the audits
For a full list of all whitepapers, visit our Whitepaper library

Legal Notices
Privacy Policy
Terms of use

basel 2 sarbanes oxley
    legislation
data controller notification binding corporate rules BCR data transfer third countries third part data transfer basel 2 regualtor regulation regulate FSA banking network security RSA encryptin algorithm Bits sacked bank staff
Blogs compliance Reports compliancy Legislation Data Protection Case Studies data privacy White Papers data protection act News information commissioner Events security standards Links information security iDefense
Retail Solutions

News - a Roundup of all News Items between January 2006 and end March 2006, Newest First

Current News Updates compliance and privacy

An archive of all the news items between January 2006 and end March 2006 on Compliance and Privacy


To avoid long load times news is archived periodically. If you can't find what you are looking for on this page please refer to our archives. Please use the search engine for ease of retrieval.

Main News page | Archives: (oldest) 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 (most recent)


VeriSign's Sclavos: "enable and protect interaction"

A slogan of the multinational VeriSign is: "enable and protect interaction." To this end, the company focuses on security and authentication, but also on guaranteeing the stability of the Web domain system. According to its president, Stratton Sclavos, "It is unclear how governments are evolving on issues of identification." In an interview with Navegante, Sclavos explained his new universal identification system for the Web, called VIP. This comes at a time when Spain is betting on the Internet with its new electronic NID (National Identification Document).

Stratton Sclavos outlines VeriSign's approach to threats, solutions and the ICANN Domain names comntroversy in a major interview for Spain on 29th March 2006

Click Here for the full interview


Compliance and Privacy Newletter - 28 March 2006

In this issue:

  • Where Has All the Trust Gone?
  • Money Mules: Sophisticated Global Cyber Criminal Operations
  • What's the Deal With Seals?
  • Online Shopping Survey
  • Banking Community "Metafisher" Attacks

Click Here for the Newsletter


New Denial of Service Attacks Worry Security Industry

There is a new kind of denial-of-service (DoS) attack hitting the Internet these days, and it has the internet security industry very worried.

The unusually powerful attacks strike at the basic structure of the Net, exploiting the computers that manage online traffic and using them to overwhelm Web sites. The effects are similar to more traditional DoS attacks, but the newer technique by hackers is far more potent because it launches using fewer hacked computers and the ensuing attack is easily amplified to be far more overwhelming.

Click Here for the full article


VeriSign Extends Leadership in Mobile Content Infrastructure with Acquisition of m-Qube

VeriSign today (20 March 2006) announced it has signed a definitive agreement to acquire m-Qube, a leading mobile channel enabler that helps companies develop, deliver and bill for mobile content, applications and messaging services. 

The acquisition of m-Qube complements the recently acquired 3united and Kontiki, extending VeriSign's digital content platform to enable carriers, Internet portals, media companies and consumer brands to provide anytime, anywhere, any device delivery of mobile and broadband services.

Click Here for the full article


Where Has All the Trust Gone?
By Elizabeth Glagowski, Managing Editor

Reprinted with permission from  1to1 Media , a  division of Carlson Marketing  Worldwide. © Carlson Marketing  Worldwide . All Rights Reserved.

It's one thing to say trust is important to customer relationships, it's another to have the numbers to back it up. A new report from Datamonitor pinpoints where companies have lost ground, and offers suggestions on how to win trust back.

According to the report, "Building and Profiting from Consumer Trust," 86 percent of the 3,200 U.S. and European consumers surveyed said that they have become more distrustful of corporations within the past five years. The report also shows that companies are aware of this drop, with 64 percent of industry leaders agreeing that consumer trust in brands has decreased in the past two years.

Click Here for the full article


What's the Deal With Seals?
By Don Peppers and Martha Rogers, Ph.D.

Reprinted with permission from  1to1 Media , a  division of Carlson Marketing  Worldwide. © Carlson Marketing  Worldwide . All Rights Reserved.

In the nascent days of the Web, consumers jumped from destination to destination with little concern about privacy. Yet even before the media alerted the masses to the twin scourges of identity theft and information brokering, TRUSTe was on the case with its Web privacy seal. Nine years later the firm is working on the tenth iteration of its standards agreement.

One question remains, however: Do consumers truly pay attention to such seals? And if so, does the absence of a seal make consumers think twice about entering their personal data or ordering a product?

Click Here for the full article


Verisign Enters Broadband Content Services Market with Kontiki Acquisition

VeriSign the leading provider of intelligent infrastructure services for the Internet and telecommunications networks, today (13 March 2006) announced it is entering the Broadband Content Services market to provide rich digital media over IP networks. VeriSign also announced that it has signed a definitive agreement to acquire Kontiki, a leading provider of managed peer delivery systems for high-quality video, software and digital content.

Click Here for the full article


Compliance and Privacy Newletter - 14 March 2006

In this issue:

  • Sober Worm Postmortem Webcast Replay
  • Social Engineering: The Effect on Information Security Webcast
  • Ever wondered about "Refer a Friend"?
  • When is Spam not Spam?
  • Who needs Chip and PIN? The Co-op trials fingerprints!

Click Here for the Newsletter


Chip & PIN? No - Mid Counties Co-op uses Biometrics

With all the major need for strong authentication, true recognition of the user, and discussions about tokens and similar things, this story caught our eye. The question is, "Is this the future?" And we will only start to know when the 16 week trial of Finger Print Payment Processing at the UK's Mid Counties Co-op's Oxford store is complete.

Pay By Touch is an innovative payment service which enables consumers to pay for their purchases using their finger rather than a card, cheque book or cash.  The payment service will be available in three Midcounties Co-op supermarkets in and around Oxford.

Click Here for the full article


Refer a Friend Scheme Legality

It was always clear, unless people wanted to try to take liberties, that a “Refer a Friend by Email” scheme was both within the letter and the spirit of both the Data Protection Act and the eCommerce regulations. It's just that people didn't understand how to implement the scheme properly.

Click Here for the full article


The Sad Confusion of SPAM and Viruses

There has long been an argument that an ISP should scan email for known virus patterns and that quarantining those emails found to contain them would all but eliminate anything except zero day viruses and the like. ISPs have long resisted because they see that as infringing their customers' right to privacy.

Compliance and Privacy has now found an instance of an ISP petting very confused. between what is SPAM and what is a virus

Click Here for the full article


Compliance and Privacy Newletter - 28 February 2006

In this issue:

  • Sober Worm Postmortem
  • Rootkits and Other Concealment Techniques in Malicious Code - iDefense Webcast Replay
  • Online identity theft: What businesses can do
  • Durant Takes UK to Strasbourg over Data Protection Act

Click Here for the Newsletter


Durant to Take Case to Strasbourg

Michael Durant, seen by some as a campaigner for strong and correct enforcement of the United Kingdom Data Protection Act 1998, but in reality a man fighting for justice, failed to convince the UK courts of his case.

He will now be seeking leave to take his case to the European Court of Human Rights in Strasbourg.

Click Here for the full article


VericChips Implanted at CityWatcher.com

Controversy has broken out over the VeriChip – a human implantable Radio Frequency ID (RFID) chip manufactured by the VeriChip Corporation – after reports that CityWatcher.com, a Cincinnati based security and surveillance corporation now requires employees to use VeriChip human implantable microchips to enter a secure data centre

Click Here for the full article


VeriSign to Acquire 3united Mobile Solutions ag

VeriSign today (13 February 2006) announced that it has signed a definitive agreement to acquire 3united Mobile Solutions ag (3united), a leading wireless applications service provider based in Vienna, Austria. VeriSign gans one of Europe's Leading Providers of Mobile Applications Available To More Than 400 Million Subscribers Worldwide

Click Here for the full article


Compliance and Privacy Newletter - 14 February 2006

In this issue:

  • iDefense WebCast Replay: The Rise of Online Islamic Propaganda
  • Rootkits and Other Concealment Techniques in Malicious Code - Live iDefense Webcast
  • Businesses Disregard Penetration Tests
  • iDefense Vulnerability Reports added

Click Here for the Newsletter


VeriSign Announces Fraud Detection Service, Acquires Snapcentric

VeriSign, the leading provider of intelligent infrastructure services for the Internet and telecommunications networks, today (10 February 2006) announced the VeriSign Fraud Detection Service, a new solution that forms part of VeriSign's overall layered authentication solution targeted at preventing online identity theft. In support of this new service, VeriSign has also reached a definitive agreement to acquire Snapcentric, Inc , a provider of online fraud detection solutions using advanced anomaly detection technology. The newly acquired technology will be a key addition to VeriSign's suite of authentication solutions, providing an invisible layer of protection against online fraud.

Click Here for the full article


Compliance and Privacy Newletter - 8 February 2006

In this special issue we have the The EMEA VeriSign Security Review - January 2006:

  • Zero-Day Attack Prompts Microsoft Patch
  • December Threat Summary
  • Windows Wi-Fi Flaw Detailed
  • New Phishing Scams
  • Standards and Regulations - Stronger is Better
  • Ask a VeriSign Consultant
  • Security Events

Click Here for the Newsletter


Stronger is Better

According to the latest figures from the Department of Trade & Industry, eight out of ten UK firms offer its employees the option of working from home for at least part of their working day. As the UK heads towards a more mobile workforce, this number bodes well for the economy's ability to integrate a more diverse range of people whose personal circumstances mean they may otherwise be left out.

Moreover, the penetration of key technologies in the UK means working from home is now more feasible than ever before. Over 27 million people have access to the Internet in the UK while, according to BT, there are 9.8 million broadband subscribers.

So surely these should be happy days for UK Plc? That would be the case were it not for the enormous security implications that arise as a result of home workers – as well as customers and partners – trying to access corporate networks via the internet.

Click Here for the full article


Businesses Disregard Penetration Tests, Risk Attack

Along with the The Confederation of British Industry, the CBI, Compliance and Privacy has found that its own survey on business vulnerability shows great apathy. We learnt today [2 February 2006] that the CBI is urging medium-sized firms to have robust security systems to prevent online attacks

According to a recent CBI survey, 60% of medium-sized firms engage with their suppliers, partners or clients online. But 52% of these firms plan for no security measures whatsoever

Click Here for the full article


Compliance and Privacy Newletter - 1 February 2006

In this issue:

  • Double lasts longer
  • 2005 in Review, 2006 Indicators and Warnings
  • The Rise of Online Islamic Propaganda
  • VeriSign in 'Leaders Quadrant' in 'Gartner MSS Magic Quadrant'

Click Here for the Newsletter


TrueDemand Announces a Strategic Relationship with VeriSign

The agreement enhances EPC-enabled replenishment applications with RFID and point-of-sale data. The integration of data from VeriSign's Intelligent Supply Chain Services Platform targets Improvements in supply chain and store-level operations

Click Here for the full article


VeriSign To Enhance Strong Authentication Platform - VeriSign® Unified Authentication – Smart Cards

VeriSign today [24 January 2006] announced it will enhance its strong authentication service with the introduction of VeriSign® Unified Authentication – Smart Cards in the second quarter of 2006. VeriSign Unified Authentication – Smart Cards will provide enterprises and government agencies with an integrated, easy-to-use suite of management tools for smart card and PKI deployments, supporting a wide range of smart card types, workflows and deployments options.

Click Here for the full article


VeriSign Positioned in Leaders Quadrant For 2H05 Managed Security Services Provider Magic Quadrant

VeriSign, Inc. the leading provider of intelligent infrastructure services for Internet and telecommunications networks, today [23 January 2006] announced it has been positioned by Gartner, Inc. in the leaders quadrant in the 2H05 North America Managed Security Services Providers (MSSP) Magic Quadrant.  A full copy of the report has been made available for download by VeriSign, the sponsors of Complianceandprivacy.com

Click Here for the full article


Compliance and Privacy Newletter - 18 January 2006

In this issue:

  • Pre-Publication Preview: "Web Security 2005"
  • The CNIL and SOX Whistleblowers
  • Open Source to Get US Gov't Bugcheck
  • Webcast Replay: Top 10 Spyware Attacks

Click Here for the Newsletter


Double lasts longer - How companies can manage strong authentication intelligently

More and more companies are taking advantage of the possibilities offered by connecting external employees, customers and business partners to their corporate networks via the internet, making important information available to them. Users generally log on to corporate networks or applications with a username and a static password. But in the aftermath of the most recent phishing attacks, many companies no longer consider this type of authentication sufficient for their needs. The point is that if a third party gets hold of this access data, there is almost no way of checking who is actually logging on accessing corporate data.

Click Here for the full article


SOX Whistleblowers Hotline Now Acceptable to the CNIL

The French people have a natural distaste for informers. Their history of wartime informers and collaborators has made it culturally challenging to accept an system which allows informers, especially anonymous informers, to have any platform where they can act. But Sarbanes Oxley requires Whistleblower hotlines. And the France needs US corporations who trade in their geography to continue to trade lawfully.

Click Here for the full article


The US Department of Homeland Security "Cleans Up" Open Source

A huge number of US Government departments use many millions of lines of Open Source software as an integral part of their applications. How deeply embarrassing would it be if Open Source were a "spy in the office"? It's not just government applications that depend on Open Source. Businesses large and small worldwide depend on it for applications ranging form mundane to complex and esoteric.

Click Here for the full article


VeriSign To Acquire CallVision

Customer Self Care and Consolidated E-Billing and Analysis Services to Complement VeriSign Commerce Suite

VeriSign, Inc. (Nasdaq: VRSN), the leading provider of intelligent infrastructure services for the Internet and telecommunications networks, today announced it has signed a definitive agreement to acquire Seattle-based CallVision, a leading provider of online analysis applications.

The acquisition will enable VeriSign to deliver converged electronic bill presentation, payment and customer self-care applications to mobile operators, Tier 1 carriers, broadband companies and consumer-brand MVNOs worldwide. By adding these applications to the comprehensive VeriSign Commerce Suite, VeriSign can help communications providers further simplify the billing process, improve customer satisfaction, reduce operational costs and mitigate churn. 

Click Here for the full article


Inspiring Consumer Confidence: Know the scams

Shopping online offers immediate gratification for customers looking for ease and convenience - especially during the holidays. But just as e-commerce is growing year after year, your customers are also growing increasingly wary of Internet scams. By educating customers on the latest scams, and establishing your site as a trustworthy business, you can help inspire your potential customers to shop at your site with confidence.

Click Here for the full article


Compliance and Privacy Newletter - 4 January 2006

In this issue:

  • Transferring Data from the EEA
  • How Vulnerable is your network? - Take part in our survey
  • Are you Sober for the 5th?
  • Webcast: Top 10 Spyware Attacks

Click Here for the Newsletter


MiFID - the Markets in Financial Instruments Directive - Market Awareness

We first brought news on the MiFID on 23rd November 2005. There was a major set of press articles and much informed comment. At that point we asked you what effect MiFID would have on you. After a month the overwhelming reaction, 62%, is "Huh? What is it?"

Click Here for the full article


GE Gains First Binding Corporate Rules UK Approval

On Thursday 15th December 2005 GE was approved in the UK as the first ever organisation gaining UK approval for its Binding Corporate Rules to export data from the European Economic Area. As the first such approval GE is in the forefront of Data Privacy.

Click Here for the full article


Compliance and Privacy Newletter - 13 December 2005

In this issue:

  • iDefense Webcast Invite - Exploitation Frameworks
  • Sober Worm Linked to Nazis
  • Sarbanes-Oxley - Business Benefits Outside the USA

Click Here for the Newsletter


Sober Worm Variant Timed with Nazi Party's 87th Anniversary , Jan. 5, 2006

iDefense reports that the next planned attack of 2005's most prolific e-mail worm family, Sober, is scheduled to start on Jan. 5, 2006 based on commands hard-coded within the worm. The attack date coincides with the 87th anniversary of the founding of the Nazi party. Additionally, the attack could have a significantly detrimental effect on Internet traffic, as e-mail servers are flooded with politically motivated spam e-mails from potentially tens of millions of e-mail addresses.

Click Here for the full article

 


This site is independent of all its sources
The contents of the site are sourced from across the industry. All copyrights are acknowledged.