Compliance, Bank Secrecy Act compliance, Basel II, Compliance best practices, E-discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX, State data security breach laws
( Mar 01, 2012 )
Enterprise threats expert Nick Lewis explains what vishing attacks are and offers best practices for defending against them.
Originally scheduled by Microsoft as part of its November Patch Tuesday release, the out-of-band patch resolves a serious security vulnerability in Kerberos.
Research from NSS Labs shows that despite carrying robust price tags, breach-detection systems are commanding intense interest from large enterprises.
Newly announced Amazon Web Services security features include an encryption key management service intended to boost cloud security and strengthen appeal of AWS to enterprises.
This IaaS management quiz will test what you have learned from the tip, videos and podcast in this Cloud Security School.
Do enterprises know which data is being stored in the cloud, and where? Expert Char Sample offers some housecleaning tips to lower cloud storage risks.
The iPhone 6 brings with it new iOS 8 enterprise features, but they may not be everything IT pros wanted. Find out what's new and why some aren't impressed.
Android 5.0 is coming, bringing with it questions about enterprise security and management. Learn about the new features in Android Lollipop.
Apple's open-in management compartmentalizes apps and lets IT admins restrict sharing of corporate data. It's basic MAM built into iOS.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
Detecting fake websites needs to be part of all companies' security strategies, according to security and domain name experts.
WordPress is the most attacked web application and websites that run the content management system (CMS) are attacked 24% more often than those using alternative systems.
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
BT asks UK officials to reject a complaint about its alleged role in a US military network used to direct drone strikes
National bus route operator First Bus has implemented mobile ticketing and announced tickets can be bought using Barclays Bank’s Pingit app
The North Wales Fire and Rescue Service (NWFRS) has secured its information exchange with Egress Switch encryption