Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
( Dec 20, 2010 )
Distributed denial-of-service attacks are increasingly a menace for enterprises. Expert Michael Cobb discusses industry initiatives that can help enterprises reduce the occurrence and power of DDoS attacks.
Can determined attackers be prevented from launching a distributed denial-of-service attack against an enterprise? In this Q&A, expert Michael Cobb discusses the reality of attack prevention and offers best practices for thwarting attacks.
News roundup: Endpoint antimalware has been long considered ineffective, yet a recent IDC report projects endpoint security growth. What gives? Plus: AWS Zocalo, new gTLDs, QR code authentication and more.
Video: Voodoo Security Founder Dave Shackleford details some of the most worrisome cloud security risks, and how to take advantage of cloud security automation.
Amazon EBS encryption is now offered by AWS. Expert Dave Shackleford explains how it works, why companies might struggle with it and whether it brings the industry one step closer to default cloud data encryption.
Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.
If you're evaluating enterprise tablets, the Surface Pro 3's PC-like form factor and Intel architecture may have some appeal. But you'll have to carefully consider its price tag.
Mobile asset management gives IT new insight into employees' smartphone and tablet usage -- who owns them, their condition and more. It's a strong complement to MDM.
After months of speculation, VMware Workspace Suite brings together VMware's EUC pieces in one place, not long after rival Citrix launched a similar platform.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
Arguably the most important task of any endpoint security system is to protect against malware. However, these products are less effective as attackers develop increasingly novel ways of sidelining device security.
Indian organizations are waking up to the risks that weak security causes as business becomes digitized
Often IT SLAs don’t reflect the real service and service experience of users. They also aren’t focused enough on the business results
Suppliers have attended an event held by the Home Office to discuss details of the new Emergency Services Network
What is the best way to expand identity and access management to third-party service providers to ensure data security?