compliance
![RSA Conference](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113729/rsac2016-listen-400x200.jpg)
My reflections after visiting RSA Conference 2016
RSA Conference has long been the place where security vendors announce new products and services, and industry trends are made. I was told by Centrify that recent breaches …
![qualys cloud agent platform](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113911/qualys-cloud-agent-platform-400x200.jpg)
Qualys extends Cloud Agent Platform to support Linux and Mac OS
Qualys announced the expansion of the Qualys Cloud Agent Platform. The Cloud Agent platform empowers organizations with flexibility and real-time asset inventory searches on a …
![ssh key management](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113946/manageengine-keymanagement-400x200.jpg)
Privileged identity management for SSH keys
ManageEngine launched Key Manager Plus, a comprehensive, Web-based, SSH key management solution at RSA Conference 2016. Available immediately, the new product joins …
![OptioLabs OptioInsight](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194202/optio-insight-400x200.jpg)
Correlate real-time data from mobile devices across the enterprise
OptioLabs announced the availability of OptioInsight for enterprises using OptioCore-secured devices. OptioInsight correlates real-time data from mobile devices across the …
![MasterCard identity check](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194222/mastercard-identity-400x200.jpg)
Mastercard’s Selfie ID: Playing Russian Roulette with consumer identities?
At this week’s Mobile World Congress in Barcelona, MasterCard announced it will accept selfie photographs and fingerprints as an alternative to passwords when verifying …
![justice sentence gavel law court](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112848/justice-400x200.jpg)
Why the legal sector is risking confidential information
The lack of unique logins, manual logoffs and concurrent logins is putting confidential information in the legal sector at risk, new research has revealed. A report by IS …
![sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195225/sign-400x200.jpg)
Compliance compounded by evolving threat landscape
As industry business models change, compliance challenges are being compounded by an evolving threat landscape and by increased scrutiny from federal agencies looking to …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195621/door_green_lock-400x200.jpg)
New date for migrating off vulnerable SSL and early TLS encryption
Following significant feedback from the global PCI community and security experts, the Payment Card Industry Security Standards Council (PCI SSC) announced a change to the …
Point of Sale malware gaining momentum as holiday shopping season approaches
Point of sale (POS) systems – what consumers often call the checkout system – are often the weak link in the chain and the choice of malware. They should be isolated …
90% of directors believe regulators should hold firms liable for hacks
A new Veracode and NYSE Governance Services survey of 276 board members reveals how cybersecurity-related corporate liability is being prioritized in the boardroom.Nine out of …
Safeguarding data in the healthcare industry
Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, new research from IS Decisions has revealed. Despite …
Compliance vs. cybersecurity: Insurers face competing priorities
Over the next 12 months insurers will face competing priorities for resources and time, with cybersecurity preparedness challenging overall regulatory compliance readiness, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege