RefBan

Referral Banners

Wednesday, June 1, 2011

Data Breaches Underscore Urgency for Security Code of Conduct; IBM Celebrates 100 Years of Health Care Breakthroughs

Don't miss a single issue of eWEEK.com Government Update. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Government Update Government Update
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Storage | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - June 1, 2011
Data Breaches Underscore Urgency for Security Code of Conduct
IBM Celebrates 100 Years of Health Care Breakthroughs
Congress Considers Government Role in Securing Critical Infrastructure
Lockheed Martin Shuts Down Remote Network Access After Detecting Intrusion
HIPAA, HITECH Compliance Not Improving Health Care Data Security: Survey
SPOTLIGHT
Galaxy Tab 10.1: Fine iPad Alternative
Expected to launch in June to challenge the iPad, Samsung's Galaxy Tab 10.1 could restore faith in Android tablets.
READ MORE >>
BEST OF eWEEK
Droid X2: Best of the Old with the New
Mango Update Sweetens Windows Phone
10 Biggest Data Breaches of 2011 So Far
Smarter eEyes Focus on Cure for Blind
FEATURED VIDEO
Time to Work from Home
Laptops, tablets, and smart devices help blur the line between office and home.
WATCH NOW >>
MOST READ STORIES
Galaxy Tab Poses Major Threat to iPad
9 Summer Smartphones Worth the Wait
Why iPad 3 Should Be Released This Year
How to Recognize Phishing Attacks
IN THIS ISSUE
Data Breaches Underscore Urgency for Security Code of Conduct
Recent high-profile breaches have prompted lawmakers to propose a federal data breach notification law. And Consumer Reports has come out with a "Code of Conduct" companies should follow to be "better custodians" of their customers' data. We take a deeper look.
READ MORE >>

IBM Celebrates 100 Years of Health Care Breakthroughs
Long before its Initiate data-management platform gave physicians a single view of patients' EHRs, Big Blue was active in developing electric limbs, the first heart-lung machine and facilitating the development of a vaccine for polio. We take a look at just some of the health care innovations IBM has achieved in the last 100 years.
READ MORE >>

Sponsored by Symantec


Examine the factors driving interest in desktop virtualization and the seven keys to selecting the right storage architecture for enterprise VDI deployments. See how Symantec VirtualStore satisfies these seven key requirements.
Click here
ADVERTISEMENT
Congress Considers Government Role in Securing Critical Infrastructure
In one of the several congressional hearings on cyber-security, lawmakers discussed data breach notification laws and how to protect critical infrastructure.
READ MORE >>

Lockheed Martin Shuts Down Remote Network Access After Detecting Intrusion
Defense contractor Lockheed Martin is dealing with problems in its internal network after a suspected intrusion reportedly using the RSA SecurID tokens.
READ MORE >>

HIPAA, HITECH Compliance Not Improving Health Care Data Security: Survey
Despite spending a lot of time making sure they are compliant with federal and state regulations, health care organizations claim they are still seeing a lot of data breaches.
READ MORE >>

Featured White Papers
How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>

Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>


Featured Webcasts
Best Practices for Virtual Machine Backups to the Cloud
Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes)
To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma.
REGISTER >>

What Can Identity Management Do for You?
Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Government Update newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Government Update, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: