Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
( Dec 20, 2010 )
( Sep 27, 2010 )
( Apr 26, 2010 )
A new variant of Java-based malware can execute regardless of the operating system used. Nick Lewis explains how to limit the threat.
A vendor's Heartbleed scan shows that a majority of Global 2000 organizations may still be vulnerable despite patching the OpenSSL flaw.
Developing a compliance awareness training program is key to preventing accidental internal compliance breaches. Expert Mike Chapple explains the steps to follow when starting such a program.
Netskope's Cloud Report shows the average number of cloud apps used in the enterprise is growing -- but the majority of those apps lack proper security and policy controls.
Understanding the risks of cloud computing is key to protecting a cloud-centric enterprise. Ravila Helen White explains the three must-know dimensions of cloud risk.
With cloud attacks rising, enterprises must evaluate their cloud security controls well in advance. Dave Shackleford provides some best defense practices.
Evaluate your enterprise mobility needs before considering any EMM vendors. Then ask the right questions about features, support and integration. And make sure to choose a provider that will evolve with the market.
As cellular technology develops, the carrier fights over standards like CDMA vs. GSM are starting to matter less and less. With LTE becoming the new standard, just how important are these differences to consumers?
There's no shortage of enterprise file sync and share vendors. Do your homework so you can pick the right provider -- and consider alternatives, too.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
Indian organizations are waking up to the risks that weak security causes as business becomes digitized
Despite what may be a dangerous new Active Directory "pass the hash" attack variant, Microsoft has downplayed the issue as a technical limitation.
Work on India’s first dedicated cryptology centre will likely now accelerate as the project has gained initial funding of Rs. 115 crore
GCHQ has certified six masters degrees focussed on cyber-security as the government attempts develop the expertise required to make the UK as part of the National Cyber Security Programme.
US federal court rules that Microsoft must comply with warrant and hand over customer email data stored in its Dublin cloud datacentre
A new information security law which places restrictions on Russian bloggers and social media users has come into force today