compliance
EMC unveils five new security advisory services
Virtualization, cloud computing, mobile technologies, and the emergence of a new class of Big Data applications have dramatically altered how organizations create, deliver, …
Surveying policies, controls and compliance
Qualys unveiled a new service for its QualysGuard Cloud Platform and suite of integrated applications for security and compliance to help businesses further automate their …
Automated managing of enterprise assets
Qualys announced the availability of hierarchical Dynamic Asset Tagging for its QualysGuard Cloud Platform and suite of applications for security and compliance. The …
Careless management of crucial security instruments
A staggering 72% of respondents to a Venafi survey admitted that they have no automated process to replace compromised certificates. This means that if their CA vendor is …
Log management deserves a company’s respect
Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it’s the law. Still, few …
ISO 27001 and BS 25999-2: Why is it better to implement them together?
Lots of companies implementing ISO 27001 struggle how to implement the requirements from Annex A.14 – Business continuity management. The problem is that ISO 27001 does …
What is ISO 27001?
Learn the basics of information security and how to use ISO 27001 as a framework for managing information security management system. For more information and training, check …
Why is residual risk so important?
The term “residual risk’ is mandatory in the risk management process according to ISO 27001, but is unfortunately very often used without appreciating the real …
Web-based breach tool for healthcare IT
Healthcare has become one of the most-breached industries, placing hospitals, clinics and health plans under scrutiny of the Department of Health and Human Services (HHS) …
ISO 27001 video tutorials
One of the biggest obstacles for companies starting to implement ISO 27001 is writing various documents required by this information security standard. Information Security …
Confidential data at risk even with policies in place
Think confidential information is protected by company IT security policies? Think again. A new survey by Xerox and McAfee, reveals that more than half of employees say they …
MasterCard and Silver Tail Systems combat online fraud
MasterCard and Silver Tail System announced a relationship that will enable merchants to differentiate fraudsters from legitimate consumers in real-time during the online …
Featured news
Resources
Don't miss
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR