Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Top Links You Must Click On


New ISACA Data Privacy Task Force to Help Businesses Manage Growing Online Issues

ISACA, a nonprofit association, marked Data Privacy Day with the announcement of a global task force on data privacy that will address the needs of businesses and government organizations worldwide. The Privacy Advisory Task Force will drive research, guidance and advocacy, and will help IT security, risk, governance and assurance professionals use the COBIT framework to manage the rapidly growing issues related to the use of information online.

Compromised data can be costly, averaging $5.5 million per organization, according to the seventh annual Ponemon Cost of a Data Breach report. Enterprises also face rising regulatory pressures. In the US, potential changes include the proposed APPS Act, which would obligate mobile application developers to be more transparent about the use of personal data; the Federal Trade Commission’s adoption of amendments to the Children’s Online Privacy Protection Rule (COPPA); and the long-awaited final omnibus rule on HIPAA from Health & Human Services, which expands liability for businesses (and their subcontractors). Organizations conducting business in Europe face the proposed EU General Data Protection Regulation, a sweeping plan to standardize privacy requirements across all EU countries.

ISACA analysis shows that these challenges are amplified for multinational companies by the absence of global standards and the rise of mobile devices and cloud computing, which make it easy for data to travel across borders. Yet ISACA’s 2012 IT Risk/Reward Barometer revealed that only 16 percent of organizations forbid cross-border travel with company data on mobile devices.

“The current debate about data privacy is just the tip of the iceberg. As technologies like Big Data and mobile devices keep making it easier to offer better customer service and online access, enterprises will experience growing pressure to collect and share private information,” said Jeff Spivey, CRISC, CPP, PSP, international vice president, ISACA, and vice president, RiskIQ. “Companies want guidance on how to strike the right balance between profiting from data and protecting data.”

As a Data Privacy Day Champion, ISACA recognizes that organizations have a responsibility to secure their part of cyber space and the networks they use. ISACA’s Privacy Advisory Task Force will focus on defining and prioritizing the knowledge needs and services valued by those who manage or support privacy initiatives. ISACA members include chief privacy officers (CPOs) and chief information security officers (CISOs) from a range of Fortune 500 companies. Task force participants represent all regions worldwide and will be announced in February 2013.

“NCSA is pleased ISACA is supporting Data Privacy Day and providing a larger year-round strategy and offerings to help businesses and government organizations manage data privacy issues from an IT risk perspective. Respecting privacy and safeguarding data are responsibilities we all share,” said Michael Kaiser, executive director, National Cyber Security Alliance.

ISACA’s privacy guidance includes:

About ISACA

With 100,000 constituents worldwide, ISACA (www.isaca.org) is a nonprofit association providing knowledge, certifications and education on information systems assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. ISACA offers the CISA, CISM, CGEIT and CRISC certifications and developed COBIT.

Twitter: https://twitter.com/ISACANews
ISACA Knowledge Center: www.isaca.org/knowledge–center

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
We often get asked “Should I use GridFS for file storage with MongoDB”. As with most things, the answer is a staunch “it depends”. GridFS looks like a great idea on paper - a virtual filesystem held within MongoDB which allows for larger than 16MB files to be held, synced and replicat...
The supply chain is evolving, and buyers need to analyze and predict, but also to manage risk. When Capgemini's business information management (BIM) practices unit needed to provide big data capabilities to its insurance company customers, it needed to deliver the right information t...
Some people believe good or bad things always happen in threes. I believe you will always be able to find three (and probably more) things that are good or bad and somewhat related, but sometimes I get surprised by the apparent coincidental appearance of several closely related “things...
This article defines long polling and presents a few techniques on how long polling could be used in Spring MVC web applications. Discussion covers both the AJAX and the server part of the solution as well as outlines a few possible options for implementation. The article compares perf...
Red Hat, Inc., on Wednesday announced that it has signed a definitive agreement to acquire eNovance, a provider of open source cloud computing services. Combined with Red Hat’s existing leadership in OpenStack, the addition of eNovance’s systems integration capabilities and engineering...
Hear from Red Hat leaders and industry experts on Tuesday, June 10, 2014, at 11am and see how Red Hat Enterprise Linux continues to deliver unmatched customer value, increased efficiency, and true strategic advantage for global customers across every industry. Attendees will learn mor...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE