Compliance, Bank Secrecy Act compliance, Basel II, Compliance best practices, E-discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX, State data security breach laws
( Dec 20, 2010 )
With viable job and training opportunities finally emerging, the time is now for CISOs and hiring managers to boost infosec's ranks with non-traditional candidates.
The Canadian anti-spam legislation applies to many enterprises. Expert Mike Chapple explains what the effects of CASL are for businesses.
New research shows that average DDoS attacks are growing larger and more prevalent as attackers have moved to exploit SSDP, the latest protocol to be abused for its amplification factor.
Newly announced Amazon Web Services security features include an encryption key management service intended to boost cloud security and strengthen appeal of AWS to enterprises.
This IaaS management quiz will test what you have learned from the tip, videos and podcast in this Cloud Security School.
Do enterprises know which data is being stored in the cloud, and where? Expert Char Sample offers some housecleaning tips to lower cloud storage risks.
With an IBM partnership yet to materialize, Apple wants enterprises to buy into its products, but whether it offers solid IT support and services remains to be seen.
BlackBerry's return to QWERTY keyboard devices and improvements to BES 12 are steps in the right direction, but is it too little, too late for many IT shops that have already moved on?
Android's popularity makes it a prime target for hackers and attackers. Fortunately, there are plenty of security features to keep devices safe.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
Detecting fake websites needs to be part of all companies' security strategies, according to security and domain name experts.
WordPress is the most attacked web application and websites that run the content management system (CMS) are attacked 24% more often than those using alternative systems.
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
CIOs say the main reason for moving to cloud computing is the innovation and agility it brings, but others see it as a cost-cutting exercise
Vacancies for tech startups increase by 80% in a year as job seekers outnumber available vacancies for the first time in six years
Harnessing existing expertise could address the demand for competence in countering cyber security threats