compliance
Tips for a unified records management approach
While an increasing number of companies have one policy for handling paper documents and electronic files, the pervasive growth of new record sources like Twitter, wikis and …
Organizations struggling to enforce policies for managing records
Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …
Leveraging PCI standards to accept mobile payments securely
The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …
Adobe privacy solution for advertisers and publishers
Adobe announced enhancements to Adobe TagManager, creating a flexible privacy solution that helps digital advertisers and publishers give consumers notice and control over how …
Cloud data encryption for Hosted Exchange
Vaultive announced Vaultive for Hosted Exchange, a cloud data encryption solution that enables customers to encrypt data-at-rest and data-in-use within the Hosted Microsoft …
Trend Micro releases SecureCloud key management system
Trend Micro announced a product development initiative using Apache CloudStack currently in incubation at the Apache Software Foundation, giving Trend Micro first-mover …
ForeScout and Fiberlink fortify mobile security
ForeScout and Fiberlink announced a partnership to deliver an integrated MDM and NAC offering. The new product, ForeScout MDM powered by MaaS360, combines cloud-based mobile …
50% of businesses feel the cloud is too risky
Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity …
DLP with real-time artificial intelligence
BeyondTrust announced PowerBroker DLP v4.0, its data loss prevention solution with real-time, distributed artificial intelligence, which provides organizations a …
Businesses unable to comply with EC 24 hour breach notification
UK businesses do not believe they have the capability to comply with new European Commission Data Protection Directive rules, specifically the ability to generate accurate …
ISO 27001/BS 25999-2: The certification process
Obtaining an ISO 27001 or BS 25999-2 certificate is not mandatory, however most of the companies implementing either of these standards want to get certified – the main …
Tenable enhances Nessus Perimeter Service
Tenable Network Security announced the newest version of its Nessus Perimeter Service which extends the power of its vulnerability scanner to help businesses protect payment …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security