compliance
Logging and Log Management
Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …
The CSO perspective on healthcare security and compliance
Randall Gamby is the CSO of the Medicaid Information Service Center of New York. In this interview he discusses healthcare security and compliance challenges and offers a …
Can mobile devices be more secure than PCs?
Mobile devices continue to fight an inaccurate perception that they’re not as secure as traditional PCs. Entrust believes that mobile devices, when properly managed and …
Healthcare leaders streamline third party assessment process
Recent breach data clearly indicates that third party business partners pose significant risk of data loss to a healthcare organization, often requiring public notification …
No strategy for data protection?
While financial services organizations are obligated to establish and report stringent service availability objectives for mission-critical systems, they are actually among …
EiQ Networks launches SOCVue service
EiQ Networks announced SOCVue, a new remote management service. With this development organizations can now leverage EiQ’s SOC team expertise and knowledge to protect …
How secure is your confidential data?
It seems ages ago that companies were first warned about the danger of confidential information being found in trash bags in front of the office, yet despite the use of …
Data breaches increase IT budgets
Protecting brand reputation and observing security best practices should be organisation’s primary motivators for data protection, while meeting compliance requirements …
Analysis of 5 million scans on 53 million hosts
Qualys has analyzed QualysGuard Policy Compliance (PC) data from more than five million scans performed by organizations worldwide to help enterprises understand key trends as …
Dataguise enhances DG for Hadoop with selective encryption
Dataguise announced DG for Hadoop 4.3, which provides both masking and selective encryption for sensitive data in major Hadoop distributions. The new version also delivers …
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
As I've always worked at small companies, I've been fascinated by the politics and problems experienced by those working for larger organizations. Surviving and thriving in …
Enterprise security for businesses addressing privacy obstacles
Protegrity announced deeper enterprise security for global businesses addressing privacy obstacles such as cross-border data transfer and industry specific regulatory …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities