Monday, November 26, 2007


Links for 2007-11-26

  • Visa Payment Aplication Mandates and Deadlines
    Visa will implement a series of mandates, beginning January 1, 2008, to eliminate the use of vulnerable payment applications from the Visa payment system. … These mandates are intended to prevent cardholder data compromises and thereby help mitigate the risk of associated financial losses such as liability from the Account Data Compromise Recovery (“ADCR”) program. Now imagine if they also included a blurb stating that these protections are their to protect the brand and not the consumer...

  • Grooming the 2010 CIO
    Business forces may be driving up demand for CIOs, but few concomitant forces are driving up the current supply. In fact, a mounting shortage of qualified candidates for top IT positions has caused companies to increase their focus on pipelining contenders for leadership roles ahead. Today's Enterprise Architects are tomorrow's CIOs

  • Dealing with Logs: what Vendors don't tell you about Log Management
    I first started following Log Management when James Governor of RedMonk started to talk about Splunk and LogLogic as part of a compliance oriented architecture. He is way ahead of his time.

  • Fewer Moms are working: Policies, Attitudes are Implicated
    While 70.9 percent of all U.S. mothers, married and unmarried, now work, the participation rate is down from its peak of 72.3 percent in 2000. American workers realize the abilities working moms possess, but our survey findings show that employers have some work to do to manage the perceptions and attitudes many employees have toward the special arrangements provided to working moms.

  • Security is not just a technical issue
    Security's days as just a technical issue are done. It is becoming a central concern for leaders at the highest level of many organizations and governments, transcending national borders. Customers are demanding it as worries about privacy and identity theft grow. Business partners, suppliers, and vendors are requiring it from one another, particularly when providing mutual network and information access. Networked efforts to steal competitive intelligence and engage in extortion are becoming more prevalent. Security breaches are increasingly motivated by financial gain. Now only if we could get software vendors to see security through the same lens as their customers.

  • << Home
    | | View blog reactions

    This page is powered by Blogger. Isn't yours?