Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
( Mar 01, 2012 )
Corporate boards have increased their awareness of security issues, but experts say they still lack information security principles.
Preview: At Black Hat USA, Point-of-Sale expert Nir Valtman will demonstrate new attacks designed to break point-of-sale security.
Video: Insider threats expert Randy Trzeciak explains why non-malicious insiders, particularly developers, pose as much risk to an enterprise as intentionally malicious insiders.
With cloud attacks rising, enterprises must evaluate their cloud security controls well in advance. Dave Shackleford provides some best defense practices.
Video: Gartner's Jay Heiser says recent attacks on cloud providers show enterprises and business units must manage cloud security requirements.
The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.
As cellular technology develops, the carrier fights over standards like CDMA vs. GSM are starting to matter less and less. With LTE becoming the new standard, just how important are these differences to consumers?
There's no shortage of enterprise file sync and share vendors. Do your homework so you can pick the right provider -- and consider alternatives, too.
Enterprises won't find success in mobility in the consumerization age if IT doesn't empower users to be productive and also responsible with data. These subjects were explored in depth during this week's BriForum.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
Despite what may be a dangerous new Active Directory "pass the hash" attack variant, Microsoft has downplayed the issue as a technical limitation.
Work on India’s first dedicated cryptology centre will likely now accelerate as the project has gained initial funding of Rs. 115 crore
It seems like an obvious step, but one missed security update, patch or hot fix could spell disaster for Exchange.
AWS, Microsoft and IBM will award free access to supercomputing and cloud resources for climate-change research
BlackBerry to buy German voice and data encryption supplier Secusmart for an undisclosed sum
Chair of Tech City UK, Joanna Shields is joining the prime minister’s Digital Taskforce to represent the digital sector