Please turn on your JavaScript for this page to function normally.
Sophos helps businesses embrace BYOD

Sophos announced the latest version of its mobile device management (MDM) solution, Sophos Mobile Control 2.5. With an updated web-based administrative console and new feature …

Tenable Network Security updates vulnerability management solution

Tenable Network Security announced SecurityCenter Continuous View, a vulnerability management solution that provides real-time, continuous vulnerability, configuration, and …

10 steps to ensure users only access what they need

Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …

Streamline security, compliance and risk management

Through the introduction of DbProtect Active Analytics, AppSecInc narrows the communications gap between DBAs, IT security professionals and their business operations …

Free data masking download

Solix Technologies announced its EDMS Data Masking Standard Edition, a high performance data masking solution for PCI/PII compliance. Through a free download users are able …

The fluctuation of compliance

After this weekend, all retailers accepting payment card transactions will be expected to either use a specialized firewall for protecting their Web applications or to have …

Online compliance and vulnerability scanning tool

First Data Corporation announced its PCI Rapid Comply solution, an online Self-Assessment Questionnaire (SAQ) and vulnerability scanning tool that can help small to mid-sized …

Most senior managers don’t know where their data is

67% of respondents say that senior management in their organizations either don’t know where all company data resides or are not sure, according to Varonis. In addition, …

ISO 27001 standard: Breaking the documentation myth

Dejan Kosutic is the founder of the Information Security & Business Continuity Academy. In this interview he discusses the future of compliance, ISO 27001 documentation, …

Data privacy protection for Hadoop

Dataguise released DgHadoop, a data privacy protection and risk assessment solution for Hadoop. It provides compliance assessment and enforcement for centralized data privacy …

nCircle automates new PCI DSS requirements

nCircle PureCloud automates the new internal vulnerability scan requirements included in the most recent update to the Payment Card Industry Data Security Standard (PCI DSS). …

ISO 22301: An overview of BCM implementation process

While many business continuity methodologies exist for more than 20 years, none of them have really managed to include business continuity in regular management duties – …

Don't miss

Cybersecurity news