Please turn on your JavaScript for this page to function normally.
Compliance auditing with in-depth reporting

Paws Studio is the compliance auditing tool for workstations and servers which enables organizations to produce intelligent compliance reports. It includes pre-defined …

Key trends in financial crime, risk and compliance for 2013

Investment in managing financial crime and compliance remains a high priority, with a significant uptick in planned expenditure for 2013, according to Detica NetReveal. Fraud …

Reflecting on 2012: Cyberwar, next generation firewalls and compliance

Historically security products have been developed either in response to, or in anticipation of, major shifts in enterprise computing – or at least that’s been my …

DataMotion unveils SecureMail Gateway

DataMotion announced updated its SecureMail Gateway, an intelligent monitoring solution that uses policy-based encryption and Exact Matching functionality to prevent data …

Analysis of U.S. breach data finds reasons for concern

According to the Health Information Trust Alliance’s (HITRUST) analysis of U.S. healthcare data breaches from 2009 to the present, the healthcare industry has made …

(IN)SECURE Magazine issue 36 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 36 has been released today. Table of contents: …

IAM solution for secure email on iOS devices

Good Technology introduced Good Vault, built on the Good Trust mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and …

LogRhythm launches automation suite for PCI

LogRhythm announced its Automation Suite for PCI. The suite helps organizations maintain continuous compliance and lower the costs of meeting PCI regulatory compliance …

Unencrypted payment data on business networks at 70%

SecurityMetrics published its second annual Payment Card Threat Report revealing unencrypted PAN (Primary Account Number) storage remains alarmingly high. Virtually no change …

Cyber-Ark secures privileged accounts

Cyber-Ark Software announced its Privileged Identity Management Suite for Critical Infrastructure Protection (PIM/CIP), which secures critical infrastructure by preventing the …

PCI Council adds guidelines for data security risk assessment

The PCI Security Standards Council (PCI SSC) released the PCI DSS Risk Assessment Guidelines Information Supplement, a product of the PCI Risk Assessment Special Interest …

Businesses admit to losing data through BYOD

Businesses are putting their corporate security at risk, with one in three organisations (33 per cent) allowing their staff unrestricted access to corporate resources from …

Don't miss

Cybersecurity news