Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
( Mar 01, 2012 )
Expert Kevin Beaver explains how enterprises can take a page from Facebook's ThreatData framework security analytics to boost enterprise defense.
With the release of Microsoft EMET 5.0 come new features and functionality. Michael Cobb explains what's new in the technical preview.
Hailed by card brands as the cure to payment card fraud, Chip and PIN security technology will take years to deploy and has already proven vulnerable.
Video: Gartner's Jay Heiser says recent attacks on cloud providers show enterprises and business units must manage cloud security requirements.
The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.
Verizon bolstered its cloud security presence with a new web application firewall. The cloud-based WAF puts the telecom giant in the growing cloud firewall market with Akamai, Imperva and others.
Enterprise mobility expert Brian Katz offers advice to help businesses choose the right vendor to meet their needs. Feature breadth, deployment model and support for new operating systems should all factor into the decision.
Samsung forges ahead with Knox EMM, despite a free Knox knockoff coming in Google Android L.
Microsoft's decimation of Nokia's devices and services business allows the company to focus on Windows Phone in the future.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
It seems like an obvious step, but one missed security update, patch or hot fix could spell disaster for Exchange.
As long as security remains a common concern for enterprise consumers, cloud providers must work hard to prove that they deserve their customers’ trust.
More than 25% of large digital marketplaces will have explicit strategies for consumer computing and security by 2018, according to Gartner
VMware has reported a 17% year-on-year revenue growth to $1.46bn for the second quarter of 2014
Payments giant PayPal has announced that it will be providing online cash advances to small businesses in the UK
Growth in demand for data and bandwidth caused sales of Juniper Networks solutions to spike during its second quarter