Please turn on your JavaScript for this page to function normally.
tunnel
Financial services IT pros overconfident in breach detection capabilities

A new Tripwire study evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly detect a cyber …

docker
Docker Security Scanning: Generate a security profile for Docker images

Docker announced Docker Security Scanning, an opt-in service for Docker Cloud private repo plans that provides a security assessment of the software included in container …

Rising threats to boost government IT security spending

Technavio analysts expect global government IT security spending to exceed USD 42 billion by 2020, growing at a CAGR of over 9%. “The global IT security spending in the …

credit cards secure
PCI DSS 3.2 is out: What’s new?

The Payment Card Industry Security Standards Council has published the latest version of PCI DSS, the information security standard for organizations that handle customer …

Europe
Five steps to GDPR compliance

For any organisations processing personal data the General Data Protection Regulation (GDPR) is important news. Agreed upon just days ago, after years of negotiations, the …

Globe
3 steps to embracing NIST 800 security controls

One proven path to improving any organization’s security posture is to embrace the National Institute of Standards and Technology’s risk management framework set forth in its …

cloud binary
Trust is the key to cloud adoption

Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding …

gears
Software tools and services used to achieve ISO 27001

With high profile breaches becoming almost a daily occurrence in the media, many organizations are now turning to the ISO 27001 information security standard to help them stay …

Healthcare
Developing a mobile health app? Check which federal laws apply

The Federal Trade Commission has created a new web-based tool for mobile health app developers, which is designed to help the developers understand what federal laws and …

RSA Conference
My reflections after visiting RSA Conference 2016

RSA Conference has long been the place where security vendors announce new products and services, and industry trends are made. I was told by Centrify that recent breaches …

qualys cloud agent platform
Qualys extends Cloud Agent Platform to support Linux and Mac OS

Qualys announced the expansion of the Qualys Cloud Agent Platform. The Cloud Agent platform empowers organizations with flexibility and real-time asset inventory searches on a …

ssh key management
Privileged identity management for SSH keys

ManageEngine launched Key Manager Plus, a comprehensive, Web-based, SSH key management solution at RSA Conference 2016. Available immediately, the new product joins …

Don't miss

Cybersecurity news