Please turn on your JavaScript for this page to function normally.
Tips for a unified records management approach

While an increasing number of companies have one policy for handling paper documents and electronic files, the pervasive growth of new record sources like Twitter, wikis and …

Organizations struggling to enforce policies for managing records

Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …

Leveraging PCI standards to accept mobile payments securely

The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …

Adobe privacy solution for advertisers and publishers

Adobe announced enhancements to Adobe TagManager, creating a flexible privacy solution that helps digital advertisers and publishers give consumers notice and control over how …

Cloud data encryption for Hosted Exchange

Vaultive announced Vaultive for Hosted Exchange, a cloud data encryption solution that enables customers to encrypt data-at-rest and data-in-use within the Hosted Microsoft …

Trend Micro releases SecureCloud key management system

Trend Micro announced a product development initiative using Apache CloudStack currently in incubation at the Apache Software Foundation, giving Trend Micro first-mover …

ForeScout and Fiberlink fortify mobile security

ForeScout and Fiberlink announced a partnership to deliver an integrated MDM and NAC offering. The new product, ForeScout MDM powered by MaaS360, combines cloud-based mobile …

50% of businesses feel the cloud is too risky

Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity …

DLP with real-time artificial intelligence

BeyondTrust announced PowerBroker DLP v4.0, its data loss prevention solution with real-time, distributed artificial intelligence, which provides organizations a …

Businesses unable to comply with EC 24 hour breach notification

UK businesses do not believe they have the capability to comply with new European Commission Data Protection Directive rules, specifically the ability to generate accurate …

ISO 27001/BS 25999-2: The certification process

Obtaining an ISO 27001 or BS 25999-2 certificate is not mandatory, however most of the companies implementing either of these standards want to get certified – the main …

Tenable enhances Nessus Perimeter Service

Tenable Network Security announced the newest version of its Nessus Perimeter Service which extends the power of its vulnerability scanner to help businesses protect payment …

Don't miss

Cybersecurity news