Interoperable standard for financial data exchange
The IFX Forum has published version 1.9 of IFX, its open, interoperable standard for financial data exchange. The IFX Forum is an international non-profit industry association …
The IFX Forum has published version 1.9 of IFX, its open, interoperable standard for financial data exchange. The IFX Forum is an international non-profit industry association …
Imation released research which shows that German workers are most likely to follow rules around secure remote working, with 50% of German respondents saying that they always …
The PCI Security Standards Council (PCI SSC), a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (PCI DSS), …
Splunk announced the general availability of the Splunk App for PCI Compliance 2.0. The app is for any organization looking for a simple, intuitive reporting and analysis …
Secunia announced the Secunia Corporate Software Inspector (CSI) 6.0 which provides customers with the ability to understand and evaluate their entire threat landscape, …
Trend Micro announced Deep Security 9, a server security platform designed to provide server, application and data security across physical, virtual and cloud environments …
Current state data breach notification laws are strikingly similar but vary in compliance requirements for businesses, with all laws highlighting the need for companies to …
The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …
As more data moves to private or public clouds, the number of super-users with access to an organization’s data multiplies, the risk of VMs being copied without the …
More than 65 percent of businesses don’t protect their customers’ private data from unauthorized employees and consultants, according to a survey of hundreds of IT …
Dell launched its Desktop Virtualization Solutions for Government (DVS-Gov), a secure solution that helps government agencies manage “geographic sprawl” through …
The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of …