Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
( Dec 20, 2010 )
( Sep 27, 2010 )
( Apr 26, 2010 )
( Apr 16, 2010 )
The 2014 Verizon data breach report shows a big rise in Web application attacks, with CMS frameworks and user credentials the most likely targets.
When it comes to security, network segmentation can be a blessing or a curse. In this tip, we look at the pros and cons of this enterprise decision.
The Verizon DBIR 2014 shows that organizations should build a security strategy around industry-specific threats and incident patterns.
Expert Dave Shackleford says cloud tokenization technology is becoming an attractive alternative to cloud encryption, but problems persist.
A cloud service provider experiencing a data breach is not an impossible scenario. Discover how enterprises should plan for the worst.
Emerging cloud attacks threaten cloud data security by exploiting the gap between enterprise controls and provider transparency.
Outlook has been the standard for office productivity functions for years, but EMM platforms with secure containers may now have comparable capabilities.
With these three models of cloud storage, find the best way to implement file-sharing services in your corporate environment.
More IT-centric features are realized in a revamped Dropbox for Business. But will it whet the whistle of IT in a competitive cloud storage market?
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Version 3.0 of the Payment Card Industry Data Security Standard has few surprises, but a host of new requirements and challenges for merchants.
Enterprises rely on ERP and CRM systems, but they pose a risk if left unpatched. Michael Cobb reviews enterprise application security best practices.
The widespread iOS app vulnerability, which stems from the way many mobile applications handle caching, allows attackers to control an app's content.
Indian companies are beginning to adopt managed security services as a lack of internal resources and rapidly changing business models force a change of strategy
OpenDNS CTO Dan Hubbard says big data techniques like machine learning and data mining can be used to spot and mitigate unknown Internet threats.
In this excerpt from Linux Malware Incident Response, authors Cameron Malin, Eoghan Casey and James Aquilina discuss volatile data collection methodology, steps and preservation.
Equinix and Microsoft have collaborated to help businesses connect their on-premise IT infrastructure with Azure cloud via a private network
Ordnance Survey has begun a new five-year agreement with BT Openreach to supply a range of data products and services
Cyber attacks are migrating to the cloud with increased adoption, a report reveals