compliance
50% of businesses feel the cloud is too risky
Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity …
DLP with real-time artificial intelligence
BeyondTrust announced PowerBroker DLP v4.0, its data loss prevention solution with real-time, distributed artificial intelligence, which provides organizations a …
Businesses unable to comply with EC 24 hour breach notification
UK businesses do not believe they have the capability to comply with new European Commission Data Protection Directive rules, specifically the ability to generate accurate …
ISO 27001/BS 25999-2: The certification process
Obtaining an ISO 27001 or BS 25999-2 certificate is not mandatory, however most of the companies implementing either of these standards want to get certified – the main …
Tenable enhances Nessus Perimeter Service
Tenable Network Security announced the newest version of its Nessus Perimeter Service which extends the power of its vulnerability scanner to help businesses protect payment …
Platform for cloud-based secure data delivery services
DataMotion announced the next generation of its DataMotion Platform. Available as a public, private or hybrid cloud solution, the platform-as-a-service (PaaS) makes it simple …
The sad reality of data security
Hacktivists, criminals, nation states, malicious or careless insiders – all these are fueling the need for data protection and risk management within enterprises. The …
SecureState partners with Qualys for cloud-based security and compliance
SecureState announced a partnership with Qualys. Under the partnership, SecureState will offer IT security and compliance cloud services from Qualys while providing its …
Private cloud solution designed to meet compliance requirements
Terremark, a Verizon Company, launched Enterprise Cloud Private Edition. This private cloud solution is designed as a single-tenant environment to meet the security compliance …
ISO 27001 implementation: How to make it easier using ISO 9001
ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …
UK enterprises fear EU Data Protection Act
The proposed EU General Data Protection Regulation could spell trouble to UK businesses, says independent IT integrator SecureData, as its “EU General Data Protection …
Manage Linux and UNIX privileged access
BeyondTrust released PowerBroker Servers Enterprise which allows organizations to seamlessly manage privileged access on Linux and UNIX systems across dynamic physical, …
Featured news
Resources
Don't miss
- Criminals create business website to sell RAT disguised as RMM tool
- Ex-Google engineers charged with orchestrating high-tech secrets extraction
- Google cleans house, bans 80,000 developer accounts from the Play Store
- The CISO view of fraud risk across the retail payment ecosystem
- Applying green energy tax policies to improve cybersecurity