Please turn on your JavaScript for this page to function normally.
Automating vendor risk management and certification processes

Qualys announced customizable questionnaires in its QualysGuard Cloud Platform and suite of integrated solutions for security and compliance. Businesses can use the new …

Dell adds identity to the classification of unstructured data

Dell Software released Dell Quest One Identity Manager – Data Governance Edition Classification Module, the latest solution that adds identity to the classification of …

Changes to the standard for PIN Transaction Security

Today the PCI Security Standards Council (PCI SSC) published version 4.0 of the PIN Transaction Security (PTS) Point of Interaction (POI) requirements. These requirements, …

Backup large data with Big Cloud

Sterling Data Storage released its largest data backup solution yet — the Big Cloud. It was designed for companies needing to securely store large amounts without sacrificing …

Logging and Log Management

Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …

The CSO perspective on healthcare security and compliance

Randall Gamby is the CSO of the Medicaid Information Service Center of New York. In this interview he discusses healthcare security and compliance challenges and offers a …

Can mobile devices be more secure than PCs?

Mobile devices continue to fight an inaccurate perception that they’re not as secure as traditional PCs. Entrust believes that mobile devices, when properly managed and …

Healthcare leaders streamline third party assessment process

Recent breach data clearly indicates that third party business partners pose significant risk of data loss to a healthcare organization, often requiring public notification …

No strategy for data protection?

While financial services organizations are obligated to establish and report stringent service availability objectives for mission-critical systems, they are actually among …

EiQ Networks launches SOCVue service

EiQ Networks announced SOCVue, a new remote management service. With this development organizations can now leverage EiQ’s SOC team expertise and knowledge to protect …

How secure is your confidential data?

It seems ages ago that companies were first warned about the danger of confidential information being found in trash bags in front of the office, yet despite the use of …

Data breaches increase IT budgets

Protecting brand reputation and observing security best practices should be organisation’s primary motivators for data protection, while meeting compliance requirements …

Don't miss

Cybersecurity news