compliance
One third of European organizations refuse to implement BYOD
Imation released research which shows that German workers are most likely to follow rules around secure remote working, with 50% of German respondents saying that they always …
Best practices for mobile software developers
The PCI Security Standards Council (PCI SSC), a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (PCI DSS), …
Splunk App for PCI Compliance 2.0 released
Splunk announced the general availability of the Splunk App for PCI Compliance 2.0. The app is for any organization looking for a simple, intuitive reporting and analysis …
Secunia launches Corporate Software Inspector 6.0
Secunia announced the Secunia Corporate Software Inspector (CSI) 6.0 which provides customers with the ability to understand and evaluate their entire threat landscape, …
Trend Micro Deep Security 9 released
Trend Micro announced Deep Security 9, a server security platform designed to provide server, application and data security across physical, virtual and cloud environments …
Map of state data breach notification laws
Current state data breach notification laws are strikingly similar but vary in compliance requirements for businesses, with all laws highlighting the need for companies to …
BYOD is not for every company, or every employee
The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …
Data protection for the cloud with ProtectV
As more data moves to private or public clouds, the number of super-users with access to an organization’s data multiplies, the risk of VMs being copied without the …
65% of companies expose personally identifiable information
More than 65 percent of businesses don’t protect their customers’ private data from unauthorized employees and consultants, according to a survey of hundreds of IT …
End-to-end desktop virtualization for government organizations
Dell launched its Desktop Virtualization Solutions for Government (DVS-Gov), a secure solution that helps government agencies manage “geographic sprawl” through …
From identity and access solutions to access governance
The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of …
Provisioning is not access governance
Organizations of all sizes face ever-stricter regulatory and security requirements to protect their data, and that of their customers. But user provisioning systems alone …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities