compliance
Qualys and Verizon join forces for new IT security and compliance solutions
Qualys and Verizon announced an agreement to expand their relationship to deliver new advanced cloud-based IT security and compliance management services to organizations …
Zscaler delivers big visibility security analytics
Zscaler unveiled new analytics technology that gives enterprise security professionals real-time visibility into all employee internet activity across web, cloud email, and …
Data protection practices in EU and Asia
Research undertaken by Field Fisher Waterhouse into the existing legal framework mandating encryption of personal data in the EU and Asia details legal requirements and …
PCI DSS cloud computing guidelines
The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …
Top five hurdles to security and compliance in industrial control systems
For many decades, Industrial Control Systems (ICS) have been the operational systems relied upon to safely and reliably deliver the essentials of daily life. Sometimes …
Compliance auditing: The first step to cyber security
Assuring that your company complies with industry standards is imperative. Being compliant not only heightens your reputation and allows you to trade in some industries, it …
IT GRC auditor outlines trends for the new year
As the new year kicks off, Coalfire, an independent IT GRC auditor, compiled their predictions for cybersecurity in 2013. “Last year was a very active year in the …
Compliance auditing with in-depth reporting
Paws Studio is the compliance auditing tool for workstations and servers which enables organizations to produce intelligent compliance reports. It includes pre-defined …
Key trends in financial crime, risk and compliance for 2013
Investment in managing financial crime and compliance remains a high priority, with a significant uptick in planned expenditure for 2013, according to Detica NetReveal. Fraud …
Reflecting on 2012: Cyberwar, next generation firewalls and compliance
Historically security products have been developed either in response to, or in anticipation of, major shifts in enterprise computing – or at least that’s been my …
DataMotion unveils SecureMail Gateway
DataMotion announced updated its SecureMail Gateway, an intelligent monitoring solution that uses policy-based encryption and Exact Matching functionality to prevent data …
Analysis of U.S. breach data finds reasons for concern
According to the Health Information Trust Alliance’s (HITRUST) analysis of U.S. healthcare data breaches from 2009 to the present, the healthcare industry has made …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities