Research More Tech Terms
File Extensions and File Formats
Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
Microsoft's December Patch Tuesday release addresses a recent zero-day vulnerability affecting TIFF images, but leaves a Windows XP zero day for 2014.
Expert Joe Granneman explains how to protect corporate data after leaks divulge information on NSA Bullrun and other government surveillance programs.
Brad Casey highlights three DNS data-monitoring methods that can help organizations determine if their networks have been breached.
Video: CSA CEO Jim Reavis recaps the 2013 Cloud Security Alliance Congress, including its SAFECode partnership and Software Defined Perimeter effort.
Nation-states are turning their attacks toward the cloud. One expert explains why he believes security automation is the only viable defense tactic.
As business demands and rogue users introduce cloud computing security risks into many enterprises, infosec pros understand they must be enablers.
In the Best Enterprise Mobility category of the Modern Infrastructure Awards, there’s one winner offering help for enterprise mobility initiatives.
With all the cloud storage and file-sharing platforms available, it can be hard to choose. Use our chart to compare features, pricing and more.
With the right business mobile apps, Android smartphones and tablets can go from consumer toys to corporate tools.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Version 3.0 of the Payment Card Industry Data Security Standard has few surprises, but a host of new requirements and challenges for merchants.
Enterprises rely on ERP and CRM systems, but they pose a risk if left unpatched. Michael Cobb reviews enterprise application security best practices.
The widespread iOS app vulnerability, which stems from the way many mobile applications handle caching, allows attackers to control an app's content.
With the CISO role being a new addition for many executive teams, expert Joe Granneman says there are several challenges facing security execs.
Protecting company data is the biggest concern that Indian CIOs have when using an external supplier to provide cloud services, according to Techtarget research
Indian organisations are taking data security seriously and implementing a wide range of security systems as they move online
The government is seeking a deputy chief technology officer who will report to CTO Liam Maxwell
The top 100 paid Android apps and 56% of the top 100 paid Apple iOS apps have been hacked, research has revealed
The Department for Work and Pensions (DWP) has failed to achieve value for money during the development of the Universal Credit IT system.