Baseline Issue February 2008By Baselinemag | Posted 2008-06-16 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
PCI Compliance: Preventing Another TJX
Credit card numbers were stolen by hackers last year. Comply now or repeat the retailer’s breach.
Self-Regulate Or Be Regulated
If PCI doesn’t stop high-profile breaches, legislators may step in.
TJX: Anatomy Of A Massive Breach
Bottom line, money is the reason security wasn’t taken more seriously.
PCI’s Big Umbrella
The four levels of PCI compliance.
2007: A Year Of Record Data Breaches
Here’s a list of the top 25 breaches of 2007.
The Rhythm Of Identity Management
Forum Credit Union adopts a system that identifies users by their typing patterns.
Rewritten Rules Add Up To A Plus
Bank of the West is streamlining its commercial loan business.
Tracking Transplant Patients
Johns Hopkins hospital is refining a transplant database.
Will The Voting Machines Get The ‘08 Ballot Right?
Pundits and technologists question the accuracy and integrity of digital balloting systems.
Recession Would Hit Hard
IT pros worry about losing infrastructure investments—and their jobs.
Halo 3 Meets Second Life
The Army is using virtual world video games to train soldiers.
CIO POWER REPORT
Here Comes The Sun
An independent California data center goes entirely green.
Customers Don’t Just Happen
It takes data integration and training to win new customers.
Long-Term Data Health
Information lifecycle management helps companies manage the data deluge.
Software Development The Agile Way
Can a collaborative, flexible method produce better software?
Starting Point: Lawrence M. Walsh
Business gets more control under SOX.
Tech Track: Michael Vizard
Getting smart about business intelligence.
Strominator: David Strom
A more open Microsoft … seriously.