A tech theory coming of age

As early as 2005, many industry analysts predicted “consumerization” — the introduction of consumer-owned/purchased devices into enterprise and business …

Explore what ISO 27001 documentation looks like

Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better while poorly written …

Improve payment security in-line with PCI DSS

NNT launched version 5 of its Change Tracker and Log Tracker Enterprise software suite. The software is specifically designed to improve payment security and protect against …

Best practices for fighting credit card theft

3Delta Systems issued a set of business best practices for protecting customer credit card account information and minimizing corporate exposure to online payment scams. …

Enhanced enterprise mobility management platform

BoxTone announced an advancement to its EMM platform, delivering the first fully automated policy and compliance management engine with a real-time mobile security dashboard, …