In this special issue, we are revealing the winners of our Security 7 awards. Discover which
outstanding information security professionals were recognized for their contributions.
Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
Data governance best practices, IT disaster recovery planning and management, Risk assessment and management, Threat prevention, Risk management frameworks, metrics and strategy
Business partner and vendor security issues, Debit and credit card fraud prevention, Financial transaction protocols and security, Logical and physical security convergence
Corporate network security, ID management and access control, Online, Web and application security, Secure communications
News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.
Learn about the tools and services available that enterprises can use to determine the security of their third-party applications.
Perhaps the biggest security bug of this generation, Heartbleed offers a number of lessons for improving incident response. Threat expert Nick Lewis highlights his key takeaways.
With cloud attacks rising, enterprises must evaluate their cloud security controls well in advance. Dave Shackleford provides some best defense practices.
Video: Gartner's Jay Heiser says recent attacks on cloud providers show enterprises and business units must manage cloud security requirements.
The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.
There's no shortage of enterprise file sync and share vendors. Do your homework so you can pick the right provider -- and consider alternatives, too.
Enterprises won't find success in mobility in the consumerization age if IT doesn't empower users to be productive and also responsible with data. These subjects were explored in depth during this week's BriForum.
The security features in today's enterprise mobility management tools help keep corporate data safe on devices and even in the cloud.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
It seems like an obvious step, but one missed security update, patch or hot fix could spell disaster for Exchange.
As long as security remains a common concern for enterprise consumers, cloud providers must work hard to prove that they deserve their customers’ trust.
More than 25% of large digital marketplaces will have explicit strategies for consumer computing and security by 2018, according to Gartner
AWS became the gold standard of public cloud. But are price wars, hybrid cloud and increased competition denting its growth?
Tibco has filed a lawsuit alleging the Merrill Lynch division of Bank of America illegally used $300m of its software for a major IT project
Jellyfish Pictures, the visual effects and animation studio behind Dr Who and the Line of Duty link has developed a DaaS for GPU