In this special issue, we are revealing the winners of our Security 7 awards. Discover which
outstanding information security professionals were recognized for their contributions.
Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
Data governance best practices, IT disaster recovery planning and management, Risk assessment and management, Threat prevention, Risk management frameworks, metrics and strategy
Business partner and vendor security issues, Debit and credit card fraud prevention, Financial transaction protocols and security, Logical and physical security convergence
Corporate network security, ID management and access control, Online, Web and application security, Secure communications
In this all-new CISSP Essentials Security School lesson featuring a two-part video tutorial, learn about the CBK section covering access control.
In the wake of the iCloud celebrity photo hack, expert Keith Palmgren offers advice on how to build more effective passwords and avoid easy data breaches.
Starting the insider threat detection process when hiring new staff members can put your company ahead of the curve. Expert Joe Granneman explains what to look for to prevent insider threats.
Docker hosting in the cloud is growing in popularity. Expert Dave Shackleford explains how Docker works and what security troubles enterprises should watch out for.
Following FireEye's new threat analytics platform for Amazon Web Services, are enterprises ready to embrace the benefits of cloud-based threat analytics?
Expert Dejan Lukan looks at iSCSI security, the possible attacks on networks using iSCSI and CHAP security.
For new members of the workforce, smartphones, tablets and the cloud are a part of life. In some IT departments, however, they're still viewed as disruptive forces. How should today's businesses respond to millennials and technology?
IT departments can benefit from a streamlined PC and mobility management strategy. Technology is still catching up as EMM vendors incorporate PC management.
As the Edward Snowden case shows, there's no such thing as absolute security. That doesn't mean you shouldn't try to secure your network as much as possible.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
US retailer Home Depot is investigating a possible data breach of customer payment card information that is potentially greater than the Target breach.
In an advisory, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
Appathon UK partners pull together to offer a range of prizes for winning students
US government inquiry finds Transcomm contractors had their systems hacked by groups linked to the Chinese government
Banks have cited customer loyalty as their main concern, according to a survey by financial services firm Temenos