Please turn on your JavaScript for this page to function normally.
Library
Application manager that pleases both IT and the user

At RSA Conference 2015 AppSense announced the release of AppSense Application Manager version 8.9.Application Manager 8.9 leverages AppSense’s decade-plus experience balancing …

Qualys Cloud Agent
Cloud agent platform for continuous IT asset inventory, security and compliance

At RSA Conference 2015, Qualys announced the launch of Qualys Cloud Agent Platform (CAP), which extends Qualys’ Cloud Security and Compliance Platform with lightweight agents …

Red door
Real-time traffic analysis and inventory of virtualized assets

Catbird Insight, a visualization solution for cloud and on-premise virtual environments that helps organizations rapidly discover, organize and analyze their virtual fabric to …

PCI DSS 3.1 released

The PCI Security Standards Council (PCI SSC) published PCI Data Security Standard (PCI DSS) Version 3.1 and supporting guidance. The revision includes minor updates and …

New security requirements for payment card vendors

The PCI Security Standards Council (PCI SSC) has published version 1.1. of its PCI Card Production Security Requirements. The updated standard helps payment card vendors …

Most businesses fail interim PCI compliance assessment

Nearly 80 percent of all businesses fail their interim PCI compliance assessment, leaving them vulnerable to cyberattacks, according to Verizon’s 2015 PCI Compliance …

When it comes to patient data privacy, compliance and security differ

If a name perfectly underscored a growing issue of concern, it’s Anthem. In February, the health insurance plan provider disclosed cyber attackers had breached its IT …

96% say ISO 27001 is important for improving security defenses

Already established as international best practice, the information security management standard ISO 27001 has become an effective weapon in the fight against cyber crime. It …

How a penetration test helps you meet PCI compliance guidelines

In order to protect credit card data, sometimes businesses have to think like a hacker. Every year, merchants who transmit, process, or store payment card data must conduct a …

How to prepare if you’re selected for an OCR audit

The forthcoming Office of Civil Rights (OCR) audits for HIPAA compliance have seen some delays this fall – but that doesn’t mean covered organizations can delay …

The one compliance lesson you need to learn

We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. At the same time, we have seen an influx …

Identity theft for dummies

It happened again. Checking into the hotel, I was asked if I can provide my credit card to cover additional expenses (not unusual). However, the receptionist simply wrote my …

Don't miss

Cybersecurity news