Security budgets increase due to EU data protection laws
Tufin announced the results of a survey assessing how the recently announced updates to EU Data Protection legislation will impact IT compliance efforts. 42% of the 100 …
Tufin announced the results of a survey assessing how the recently announced updates to EU Data Protection legislation will impact IT compliance efforts. 42% of the 100 …
Encryption is now viewed as a strategic issue with business leaders gaining greater influence over their organization’s encryption strategy, according to Richard Moulds, …
Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …
Rapid7 and Modulo announced they are working together to deliver an holistic view of threat and vulnerability risk, correlated with broader regulatory, policy and compliance …
Virtualization, cloud computing, mobile technologies, and the emergence of a new class of Big Data applications have dramatically altered how organizations create, deliver, …
Qualys unveiled a new service for its QualysGuard Cloud Platform and suite of integrated applications for security and compliance to help businesses further automate their …
Qualys announced the availability of hierarchical Dynamic Asset Tagging for its QualysGuard Cloud Platform and suite of applications for security and compliance. The …
A staggering 72% of respondents to a Venafi survey admitted that they have no automated process to replace compromised certificates. This means that if their CA vendor is …
Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it’s the law. Still, few …
Lots of companies implementing ISO 27001 struggle how to implement the requirements from Annex A.14 – Business continuity management. The problem is that ISO 27001 does …
Learn the basics of information security and how to use ISO 27001 as a framework for managing information security management system. For more information and training, check …
The term “residual risk’ is mandatory in the risk management process according to ISO 27001, but is unfortunately very often used without appreciating the real …