Please turn on your JavaScript for this page to function normally.
Potential privacy problems for companies accepting Bitcoins

Businesses accepting Bitcoin payments might want to consider the privacy implications that such an option creates for its customers and for themselves. As you may or may not …

QualysGuard Express Lite released

Qualys announced QualysGuard Express Lite, a small business version of the company’s suite of integrated security and compliance solutions. The new cloud offering …

Automating vendor risk management and certification processes

Qualys announced customizable questionnaires in its QualysGuard Cloud Platform and suite of integrated solutions for security and compliance. Businesses can use the new …

Dell adds identity to the classification of unstructured data

Dell Software released Dell Quest One Identity Manager – Data Governance Edition Classification Module, the latest solution that adds identity to the classification of …

Changes to the standard for PIN Transaction Security

Today the PCI Security Standards Council (PCI SSC) published version 4.0 of the PIN Transaction Security (PTS) Point of Interaction (POI) requirements. These requirements, …

Backup large data with Big Cloud

Sterling Data Storage released its largest data backup solution yet — the Big Cloud. It was designed for companies needing to securely store large amounts without sacrificing …

Logging and Log Management

Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …

The CSO perspective on healthcare security and compliance

Randall Gamby is the CSO of the Medicaid Information Service Center of New York. In this interview he discusses healthcare security and compliance challenges and offers a …

Can mobile devices be more secure than PCs?

Mobile devices continue to fight an inaccurate perception that they’re not as secure as traditional PCs. Entrust believes that mobile devices, when properly managed and …

Healthcare leaders streamline third party assessment process

Recent breach data clearly indicates that third party business partners pose significant risk of data loss to a healthcare organization, often requiring public notification …

No strategy for data protection?

While financial services organizations are obligated to establish and report stringent service availability objectives for mission-critical systems, they are actually among …

EiQ Networks launches SOCVue service

EiQ Networks announced SOCVue, a new remote management service. With this development organizations can now leverage EiQ’s SOC team expertise and knowledge to protect …

Don't miss

Cybersecurity news