Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
( Mar 01, 2012 )
The Bitcoin market is maturing but security issues, such as private key management, persist. The Bitcoin Foundation gives the good news and bad news regarding Bitcoin security.
News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.
Home Depot said late Thursday that its recent breach involving 56 million payment cards was the result of custom-built malware, and that the company has since rolled out new POS encryption technology.
Internet radio company Pandora explains how it found a strategy to embrace shadow IT and still secure cloud app usage within the company.
Docker hosting in the cloud is growing in popularity. Expert Dave Shackleford explains how Docker works and what security troubles enterprises should watch out for.
Following FireEye's new threat analytics platform for Amazon Web Services, are enterprises ready to embrace the benefits of cloud-based threat analytics?
Implementing a mobile device security policy is a good first step, but if employees don't understand its importance, it may be all for naught. That's where training comes in.
Samsung has answered questions about the future of Knox with three new versions of its EMM product, two of which will be free.
For new members of the workforce, smartphones, tablets and the cloud are a part of life. In some IT departments, however, they're still viewed as disruptive forces. How should today's businesses respond to millennials and technology?
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
US retailer Home Depot is investigating a possible data breach of customer payment card information that is potentially greater than the Target breach.
In an advisory, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
IBM has opened a cloud resiliency centre in North Carolina to provide business continuity capabilities in the cloud
Businesses are increasingly acquiring software companies to bolster software development expertise a new report finds
With six months left to apply, businesses are being urged to claim their share of the £100m government broadband grants