compliance
Changes to the standard for PIN Transaction Security
Today the PCI Security Standards Council (PCI SSC) published version 4.0 of the PIN Transaction Security (PTS) Point of Interaction (POI) requirements. These requirements, …
Backup large data with Big Cloud
Sterling Data Storage released its largest data backup solution yet — the Big Cloud. It was designed for companies needing to securely store large amounts without sacrificing …
Logging and Log Management
Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …
The CSO perspective on healthcare security and compliance
Randall Gamby is the CSO of the Medicaid Information Service Center of New York. In this interview he discusses healthcare security and compliance challenges and offers a …
Can mobile devices be more secure than PCs?
Mobile devices continue to fight an inaccurate perception that they’re not as secure as traditional PCs. Entrust believes that mobile devices, when properly managed and …
Healthcare leaders streamline third party assessment process
Recent breach data clearly indicates that third party business partners pose significant risk of data loss to a healthcare organization, often requiring public notification …
No strategy for data protection?
While financial services organizations are obligated to establish and report stringent service availability objectives for mission-critical systems, they are actually among …
EiQ Networks launches SOCVue service
EiQ Networks announced SOCVue, a new remote management service. With this development organizations can now leverage EiQ’s SOC team expertise and knowledge to protect …
How secure is your confidential data?
It seems ages ago that companies were first warned about the danger of confidential information being found in trash bags in front of the office, yet despite the use of …
Data breaches increase IT budgets
Protecting brand reputation and observing security best practices should be organisation’s primary motivators for data protection, while meeting compliance requirements …
Analysis of 5 million scans on 53 million hosts
Qualys has analyzed QualysGuard Policy Compliance (PC) data from more than five million scans performed by organizations worldwide to help enterprises understand key trends as …
Dataguise enhances DG for Hadoop with selective encryption
Dataguise announced DG for Hadoop 4.3, which provides both masking and selective encryption for sensitive data in major Hadoop distributions. The new version also delivers …