Compliance, Bank Secrecy Act compliance, Basel II, Compliance best practices, E-discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX, State data security breach laws
( Dec 20, 2010 )
A report from security vendor Damballa shows that the Backoff malware variant has infected an increasing number of point-of-sale systems in recent months.
Malware using seemingly real digital certificates is becoming more prevalent. Expert Nick Lewis discusses how to detect fraudulent certificates.
IaaS clouds need baseline server configuration, but real security requires enterprises to go beyond that. Expert Dave Shackleford reviews some IaaS security best practices.
There is more potential trouble for Apple iCloud users as a nationwide man-in-the-middle attack struck the iCloud website in China amid the country's launch of the new iPhone 6.
Planning a data backup strategy on a private cloud requires certain factors to assure security. Expert Dejan Lukan gives some advice on what to take into consideration.
IT pros who need to simplify app volume purchases for iOS devices will see enhancements as IBM hints at combining MDM and purchase management.
Get ready, IT pros: Connected devices are about to deluge the enterprise and IT must take big steps to grapple with data, security and integration.
The increasing number of mobile devices in enterprise environments means a mobile data backup plan is required, and it won't be the same as one for a laptop.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said.
Apple has recently come under fire over the security of its customers' data, but the company has done a “nice job” using best practices to secure iTunes backups, according to a security researcher.
An MIT professor and his student have written a paper describing the use of an algorithm to predict the price of Bitcoin
At least 90% of IT decision makers in most countries claim tablets are a standard part of their company’s IT strategy
A Microsoft study shows 40% of US citizens experience weekly attempts to access their personal information online