compliance
A tech theory coming of age
As early as 2005, many industry analysts predicted “consumerization” — the introduction of consumer-owned/purchased devices into enterprise and business …
Explore what ISO 27001 documentation looks like
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better while poorly written …
IT execs view security and privacy as top priority
New and complex IT risks and changing business priorities challenge today’s IT leaders, according to a new survey from Protiviti. The results of the study reveal six …
McAfee and RSA partner for compliance and risk management solution
McAfee and RSA announced a new joint solution which integrates security data from the McAfee ePolicy Orchestrator platform (McAfee ePO) with business infrastructure and …
Improve payment security in-line with PCI DSS
NNT launched version 5 of its Change Tracker and Log Tracker Enterprise software suite. The software is specifically designed to improve payment security and protect against …
How to conduct an internal audit according to ISO 27001 and BS 25999-2
The key purpose of an internal audit is for an organization to find out if all the processes and activities are running as they are expected. An nternal audit is usually …
Best practices for fighting credit card theft
3Delta Systems issued a set of business best practices for protecting customer credit card account information and minimizing corporate exposure to online payment scams. …
Payment card security compliance remains problematic
Too many businesses are struggling to comply with payment card security standards, putting consumers’ confidential information at risk. According to the Verizon Payment …
IP Address Management platform Proteus 3.7 released
BlueCat Networks announced the latest release of Proteus, a scalable IP Address Management (IPAM) platform. Proteus 3.7 delivers enhanced usability, scalability, seamless …
Enhanced enterprise mobility management platform
BoxTone announced an advancement to its EMM platform, delivering the first fully automated policy and compliance management engine with a real-time mobile security dashboard, …
Veracode enhances its application risk management platform
Veracode, announced enhancements to its cloud-based application risk management platform that make it even easier to embed security verification processes into the software …
Secure corporate email archiving solution
According to The Radicati Group, the average corporate employee will send and receive about 112 email messages per day in 2011 and this volume will continue to grow. Many of …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)