compliance

Qualys extends Cloud Agent Platform to support Linux and Mac OS
Qualys announced the expansion of the Qualys Cloud Agent Platform. The Cloud Agent platform empowers organizations with flexibility and real-time asset inventory searches on a …

Privileged identity management for SSH keys
ManageEngine launched Key Manager Plus, a comprehensive, Web-based, SSH key management solution at RSA Conference 2016. Available immediately, the new product joins …

Correlate real-time data from mobile devices across the enterprise
OptioLabs announced the availability of OptioInsight for enterprises using OptioCore-secured devices. OptioInsight correlates real-time data from mobile devices across the …

Mastercard’s Selfie ID: Playing Russian Roulette with consumer identities?
At this week’s Mobile World Congress in Barcelona, MasterCard announced it will accept selfie photographs and fingerprints as an alternative to passwords when verifying …

Why the legal sector is risking confidential information
The lack of unique logins, manual logoffs and concurrent logins is putting confidential information in the legal sector at risk, new research has revealed. A report by IS …

Compliance compounded by evolving threat landscape
As industry business models change, compliance challenges are being compounded by an evolving threat landscape and by increased scrutiny from federal agencies looking to …

New date for migrating off vulnerable SSL and early TLS encryption
Following significant feedback from the global PCI community and security experts, the Payment Card Industry Security Standards Council (PCI SSC) announced a change to the …
Point of Sale malware gaining momentum as holiday shopping season approaches
Point of sale (POS) systems – what consumers often call the checkout system – are often the weak link in the chain and the choice of malware. They should be isolated …
90% of directors believe regulators should hold firms liable for hacks
A new Veracode and NYSE Governance Services survey of 276 board members reveals how cybersecurity-related corporate liability is being prioritized in the boardroom.Nine out of …
Safeguarding data in the healthcare industry
Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, new research from IS Decisions has revealed. Despite …
Compliance vs. cybersecurity: Insurers face competing priorities
Over the next 12 months insurers will face competing priorities for resources and time, with cybersecurity preparedness challenging overall regulatory compliance readiness, …
The cost of EMV compliance
Credit card companies are making the final call for US merchants to switch over to EMV chip technology in anticipation of the looming deadline. Merchants now have less than …
Featured news
Resources
Don't miss
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech