compliance
Syncplicity launches Security and Compliance Console
With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where …
PCI DSS is working, but there are challenges to overcome
Recent figures from the UK Cards Association showed that banking industry initiatives, including PCI have been successful in decreasing the volume of card and bank account …
Rise of unencrypted cards
71 percent of merchants were found to store unencrypted payment card data in 2011, which is an increase of 8 percent since 2010, according to a study by SecurityMetrics. …
Top security predictions for 2012
As December rolls in and 2012 looms on the IT security horizon, Tufin Technologies – the security lifecycle management specialist – has come up with its top five …
42% of disaster recovery strategies dead or dormant
UK businesses are still ill-prepared to deal with downtime and unexpected disruption to operations, says ControlCircle. A recent survey of 100 CIOs/COOs/IT heads identified …
nCircle updates its automated security and compliance auditing suite
nCircle announced new versions of every product in nCircle Suite360, the world’s most comprehensive suite of products that enables organizations to improve security and …
Improved PCI certification service from McAfee
PCI DSS certification is required by major credit card companies for all merchants who process, accept, or store credit card information. The 12 security requirements in the …
40% of orgs doubt effectiveness of disposal procedures of old PCs
UK organizations aren’t certain that all data and settings are deleted from devices prior to disposal, say the findings of a recent survey by user and infrastructure …
Information security or IT security?
One would think that these two terms are synonyms – after all, isn’t information security all about computers? Not really. The basic point is this – you …
Change management leads to security breaches
75% of organizations believe their current change management processes could put them at risk of a security breach, according to Tufin. Having sampled 100 network security …
Free webinar: ISO 9001 for ISO 27001 implementation
Most of the companies that have implemented ISO 9001 have no idea they can implement ISO 27001, this increasingly popular information security standard, with much less effort …
Integrate security and risk management: TOGAF and SABSA
There is a new free guide that enables enterprise and security architects to integrate security and risk management approaches into enterprise-level architectures. Endorsed …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)