Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
A new website built by Troy Hunt enables possible data breach victims to discover compromised accounts from several high-profile breaches.
With the CISO role being a new addition for many executive teams, expert Joe Granneman says there are several challenges facing security execs.
Expert Nick Lewis details why antimalware suites don't provide adequate protection against Web-based malware and how enterprises can defend users.
A practitioner at the 2013 CSA Congress says enterprises must plan for a cloud incident because providers often fail to detail their responsibilities.
At the 2013 CSA Congress, executives from Microsoft and AWS made the case for why cloud provider security is superior to traditional IT security.
Video: Securosis CEO Rich Mogull details cloud security basics, including how the cloud affects enterprises today and the joys of security automation.
On the heels of an impassioned letter from its new CEO, BlackBerry tells everyone who'll listen that it's still the go-to for EMM with a BES 10 update.
A humbled Microsoft has realized that Windows isn't part of many mobile enterprise strategies and had to make changes in how it tackles that market.
Take a look at these reviews of Android tablets to learn about new devices and features that could be on their way to your network.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Version 3.0 of the Payment Card Industry Data Security Standard has few surprises, but a host of new requirements and challenges for merchants.
Enterprises rely on ERP and CRM systems, but they pose a risk if left unpatched. Michael Cobb reviews enterprise application security best practices.
The widespread iOS app vulnerability, which stems from the way many mobile applications handle caching, allows attackers to control an app's content.
Protecting company data is the biggest concern that Indian CIOs have when using an external supplier to provide cloud services, according to Techtarget research
Indian organisations are taking data security seriously and implementing a wide range of security systems as they move online
Web inventor Tim Berners-Lee has called for bold steps to protect basic human rights online
Cloud provider to take on 10 apprentices in large-scale cloud and virtualised computing environments
Supporting young businesses and fixing the skills gap was a recurring theme during today’s Autumn Statement in the House of Commons
The government has begun the process to select open standards for documents