compliance
Provisioning is not access governance
Organizations of all sizes face ever-stricter regulatory and security requirements to protect their data, and that of their customers. But user provisioning systems alone …
Organizations lack protocols to protect data in the cloud
While sixty-two percent of survey respondents are leveraging the cloud and/or virtualization, only 33 percent of these organizations test data recovery plans regularly to …
Sophos helps businesses embrace BYOD
Sophos announced the latest version of its mobile device management (MDM) solution, Sophos Mobile Control 2.5. With an updated web-based administrative console and new feature …
Tenable Network Security updates vulnerability management solution
Tenable Network Security announced SecurityCenter Continuous View, a vulnerability management solution that provides real-time, continuous vulnerability, configuration, and …
10 steps to ensure users only access what they need
Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …
Streamline security, compliance and risk management
Through the introduction of DbProtect Active Analytics, AppSecInc narrows the communications gap between DBAs, IT security professionals and their business operations …
Free data masking download
Solix Technologies announced its EDMS Data Masking Standard Edition, a high performance data masking solution for PCI/PII compliance. Through a free download users are able …
The fluctuation of compliance
After this weekend, all retailers accepting payment card transactions will be expected to either use a specialized firewall for protecting their Web applications or to have …
Online compliance and vulnerability scanning tool
First Data Corporation announced its PCI Rapid Comply solution, an online Self-Assessment Questionnaire (SAQ) and vulnerability scanning tool that can help small to mid-sized …
Most senior managers don’t know where their data is
67% of respondents say that senior management in their organizations either don’t know where all company data resides or are not sure, according to Varonis. In addition, …
ISO 27001 standard: Breaking the documentation myth
Dejan Kosutic is the founder of the Information Security & Business Continuity Academy. In this interview he discusses the future of compliance, ISO 27001 documentation, …
Data privacy protection for Hadoop
Dataguise released DgHadoop, a data privacy protection and risk assessment solution for Hadoop. It provides compliance assessment and enforcement for centralized data privacy …
Featured news
Resources
Don't miss
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)