Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
( Dec 20, 2010 )
Security expert Michael Cobb offers pointers on how to assign risk values during a security risk assessment.
Secure software development expert Gary McGraw says what's great about the IEEE's new design center is that it tackles the thorniest problem.
Video: Keith Barker of CBT Nuggets shows how to use the BeEF Project, a free penetration testing framework, to train employees on Internet browser security.
Amazon EBS encryption is now offered by AWS. Expert Dave Shackleford explains how it works, why companies might struggle with it and whether it brings the industry one step closer to default cloud data encryption.
Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.
Virtual DMZ cloud configurations require specific security tactics. Expert Dejan Lukan looks at the different types of virtual DMZs and how they differ from physical DMZs.
Mobile asset management gives IT new insight into employees' smartphone and tablet usage -- who owns them, their condition and more. It's a strong complement to MDM.
After months of speculation, VMware Workspace Suite brings together VMware's EUC pieces in one place, not long after rival Citrix launched a similar platform.
It's worth taking a look at the new features Apple has included to make MDM with iOS devices easier in the coming update. Automated enrollment, DEP and embedded features all work in harmony to make admins' jobs easier.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
Arguably the most important task of any endpoint security system is to protect against malware. However, these products are less effective as attackers develop increasingly novel ways of sidelining device security.
Indian organizations are waking up to the risks that weak security causes as business becomes digitized
CaixaBank has commissioned Fujitsu to build 8,500 ATMs that will be contactless
Microsoft has re-released a software security update that was withdrawn because it put some computers in endless reboot loops
Scottish government to procure fixed voice and other communications services from Virgin Media Business