Please turn on your JavaScript for this page to function normally.
The crucial role of crypto technologies

Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …

Eating the US EMV elephant

Last week, Visa announced that it would eliminate the requirement for eligible merchants to annually validate their compliance with the PCI DSS for any year in which at least …

Failure to invest in secure software a major risk

Failure to take software security seriously is putting organizations, brands and people at risk, according to a report by Creative Intellect Consulting. Key highlights from …

Integrated single sign-on and authentication to cloud and SaaS

SafeNet announced Authentication Manager (SAM) 8.0. The unified enterprise platform combines strong authentication and identity federation to help organizations centrally …

41% of organizations not aware of security risks

41 percent of organizations are not well aware of or protected against IT security risks, according to McAfee. Another 40 percent are not completely confident they can …

An in-depth view of IT policy compliance

Qualys announced the release of QualysGuard Policy Compliance 3.0, providing more comprehensive policy compliance scanning capabilities without the need to install agents. The …

Hardware security modules for cryptographic protection

Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …

Organizations still don’t understand application security strategies

Organizations lack a sense of urgency for securing critical data, according to a new report by Application Security. The report found that the greatest challenges to securing …

LogLogic Compliance Manager 2.0 released

LogLogic released Compliance Manager 2.0 which provides users with an executive view into an enterprise’s compliance posture and reduces the time and costs required to …

Lush hack due to numerous security vulnerabilities

The Web site of Lush, the natural ingredients cosmetic firm, has reportedly been cracked and subverted by attackers, with reports that customers’ bank details have …

Think PCI is not beneficial? Think again

In the wake of massive data breaches of payment card information in the past few years, the topic of PCI compliance and its adoption has been top of mind in any organization …

Managed Wi-Fi access and PCI scanning in a single device

AirTight Networks launched Secure Wi-Fi – a suite of managed services which adds Wi-Fi access. With today’s launch, the company offers hosted, cloud-based, secure …

Don't miss

Cybersecurity news