Auditing, testing and assessment for compliance, Bank Secrecy Act compliance, Basel II regulatory compliance and requirements, Compliance best practices, Electronic data discovery compliance, FACTA law requirements, FFIEC compliance guidelines, GLBA compliance requirements, HIPAA: Laws and guidelines, PCI DSS: Audits and requirements, Risk frameworks, metrics and strategy, SEC and FDIC regulations, SOX financial reporting compliance, State data security breach laws
( Mar 01, 2012 )
Cloud-based storage introduces a number of risks, but banning these services outright is unlikely to generate the desired results.
Video: Martin Roesch discusses Cisco's plans to combine its policy-centric security technology with Sourcefire's threat-focused products.
The 2014 Verizon data breach report shows a big rise in Web application attacks, with CMS frameworks and user credentials the most likely targets.
Can the combination of the cloud and BYOD lessen the headaches of security admins? Ed Moyle explains how a mix of the two can ease security woes.
Expert Dave Shackleford says cloud tokenization technology is becoming an attractive alternative to cloud encryption, but problems persist.
A cloud service provider experiencing a data breach is not an impossible scenario. Discover how enterprises should plan for the worst.
Outlook has been the standard for office productivity functions for years, but EMM platforms with secure containers may now have comparable capabilities.
With these three models of cloud storage, find the best way to implement file-sharing services in your corporate environment.
More IT-centric features are realized in a revamped Dropbox for Business. But will it whet the whistle of IT in a competitive cloud storage market?
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Version 3.0 of the Payment Card Industry Data Security Standard has few surprises, but a host of new requirements and challenges for merchants.
Enterprises rely on ERP and CRM systems, but they pose a risk if left unpatched. Michael Cobb reviews enterprise application security best practices.
The widespread iOS app vulnerability, which stems from the way many mobile applications handle caching, allows attackers to control an app's content.
It is more than 10 years since context-aware security was proposed. We look at how the technology has evolved.
Indian companies are beginning to adopt managed security services as a lack of internal resources and rapidly changing business models force a change of strategy
OpenDNS CTO Dan Hubbard says big data techniques like machine learning and data mining can be used to spot and mitigate unknown Internet threats.
The Home Office is searching for a new provider of its emergency services communications contract
Tech London Advocates (TLA) has launched a competition to find innovative health tech startups.
Successful firms need to harness the skills, capabilities and passions of the external marketplace by becoming more 'outside-in'