Compliance, Bank Secrecy Act compliance, Basel II, Compliance best practices, E-discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX, State data security breach laws
Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA product.
CurrentC, the retailer-backed mobile-payment platform, admitted to the breach shortly after the Apple Pay competitor was blamed for shutting down other NFC-based payment options.
Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.
The cloud threat-modeling process begins with a fundamental understanding of threat management. Expert Ravila Helen White details these best practices for enterprises.
IaaS clouds need baseline server configuration, but real security requires enterprises to go beyond that. Expert Dave Shackleford reviews some IaaS security best practices.
There is more potential trouble for Apple iCloud users as a nationwide man-in-the-middle attack struck the iCloud website in China amid the country's launch of the new iPhone 6.
Dell Software is quietly retiring the KACE K3000 MDM appliance and pushing their other devices, along with a cloud-based mobile management service.
In an effort to entice more enterprise customers, Microsoft beefed up Office 365 with MDM and free unlimited storage.
Amazon Zocalo isn't a game changer for enterprise file sync-and-share, but it gives IT a reputable option to consider from cloud leader AWS.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
WordPress is the most attacked web application and websites that run the content management system (CMS) are attacked 24% more often than those using alternative systems.
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said.
Problems have surfaced as users try to use Gov.UK Verify to prove their identities
Local authorities need to have a set of common standards to develop digital innovations, says Surrey County Council’s CDO
Troels Oerting, head of Europol’s European Cybercrime Centre, says businesses must heed the risk of cyber crime