Please turn on your JavaScript for this page to function normally.
The most challenging compliance regulation? HIPAA

From an IT standpoint, the Health Insurance Portability and Accountability Act (HIPAA) is the most challenging regulation to businesses today, according to Ipswitch. HIPAA, …

Most organizations can’t access critical security data

Many enterprises feel that their security processes are failing to meet their potential due to a lack of coordination, benchmarking, and proactive improvement among the …

Find and eliminate credit card data

Nearly two-thirds of merchant computer systems store unencrypted payment card data in violation of the PCI DSS, according to scans of more than 475 merchant networks of all …

The crucial role of crypto technologies

Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …

Eating the US EMV elephant

Last week, Visa announced that it would eliminate the requirement for eligible merchants to annually validate their compliance with the PCI DSS for any year in which at least …

Failure to invest in secure software a major risk

Failure to take software security seriously is putting organizations, brands and people at risk, according to a report by Creative Intellect Consulting. Key highlights from …

Integrated single sign-on and authentication to cloud and SaaS

SafeNet announced Authentication Manager (SAM) 8.0. The unified enterprise platform combines strong authentication and identity federation to help organizations centrally …

41% of organizations not aware of security risks

41 percent of organizations are not well aware of or protected against IT security risks, according to McAfee. Another 40 percent are not completely confident they can …

An in-depth view of IT policy compliance

Qualys announced the release of QualysGuard Policy Compliance 3.0, providing more comprehensive policy compliance scanning capabilities without the need to install agents. The …

Hardware security modules for cryptographic protection

Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …

Organizations still don’t understand application security strategies

Organizations lack a sense of urgency for securing critical data, according to a new report by Application Security. The report found that the greatest challenges to securing …

LogLogic Compliance Manager 2.0 released

LogLogic released Compliance Manager 2.0 which provides users with an executive view into an enterprise’s compliance posture and reduces the time and costs required to …

Don't miss

Cybersecurity news