Please turn on your JavaScript for this page to function normally.
Executives, IT officers most concerned about malicious insiders

An international survey polling 260 respondents from a wide variety of industry sectors has revealed that over half of them are more worried about their own employees turning …

ManageEngine enhances Firewall Analyzer and EventLog Analyzer

ManageEngine announced enhancements to its firewall security and configuration management software, Firewall Analyzer, and to EventLog Analyzer, its log management and IT …

The current state of application security

New research offers a better way to understand the maturity of an organization’s application security program in comparison to the core competencies of high-performing …

Compliance and security vulnerabilities are top concerns for POS systems

Without adequate controls to manage store systems and the increase in number and variety of devices – retailers can expect security costs to continue to increase …

Cloud emulation sandboxing service tackles zero-day attacks

Check Point has announced the availability of Check Point R77, the latest release for its Software Blade Architecture. R77 offers over 50 product enhancements, including the …

How encryption and tokenization help with cloud services adoption

Today’s CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it. …

Manage security across multiple systems with Milan 3.0

Prosperoware Milan 3.0, an integrated platform for information governance, now includes a new module that helps firms move to a “need-to-know” security model. …

What to expect with PCI DSS 3.0

The PCI Security Standards Council (PCI SSC) published PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) 3.0 change highlights, as a …

Netwrix updates its configuration auditing software

Netwrix Corporation announced Netwrix Auditor 5.0, a configuration auditing solution for security, compliance and operations across the entire IT infrastructure. It provides …

Compliance no longer main driver of security measures

The need to ensure compliance with regulations should no longer be the primary consideration of CIOs when planning IT risk and security measures. Gartner said compliance is an …

Dependability through Assuredness Standard released

The Open Group announces the publication of the Dependability through Assuredness Standard (O-DA), which will benefit organizations relying on complex systems to avoid or …

Key security metrics revealed

A new Ponemon Institute study examined the key risk-based security metrics IT security managers used most frequently to gauge the effectiveness of their organizations’ …

Don't miss

Cybersecurity news