compliance
Change management leads to security breaches
75% of organizations believe their current change management processes could put them at risk of a security breach, according to Tufin. Having sampled 100 network security …
Free webinar: ISO 9001 for ISO 27001 implementation
Most of the companies that have implemented ISO 9001 have no idea they can implement ISO 27001, this increasingly popular information security standard, with much less effort …
Integrate security and risk management: TOGAF and SABSA
There is a new free guide that enables enterprise and security architects to integrate security and risk management approaches into enterprise-level architectures. Endorsed …
A tech theory coming of age
As early as 2005, many industry analysts predicted “consumerization” — the introduction of consumer-owned/purchased devices into enterprise and business …
Explore what ISO 27001 documentation looks like
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better while poorly written …
IT execs view security and privacy as top priority
New and complex IT risks and changing business priorities challenge today’s IT leaders, according to a new survey from Protiviti. The results of the study reveal six …
McAfee and RSA partner for compliance and risk management solution
McAfee and RSA announced a new joint solution which integrates security data from the McAfee ePolicy Orchestrator platform (McAfee ePO) with business infrastructure and …
Improve payment security in-line with PCI DSS
NNT launched version 5 of its Change Tracker and Log Tracker Enterprise software suite. The software is specifically designed to improve payment security and protect against …
How to conduct an internal audit according to ISO 27001 and BS 25999-2
The key purpose of an internal audit is for an organization to find out if all the processes and activities are running as they are expected. An nternal audit is usually …
Best practices for fighting credit card theft
3Delta Systems issued a set of business best practices for protecting customer credit card account information and minimizing corporate exposure to online payment scams. …
Payment card security compliance remains problematic
Too many businesses are struggling to comply with payment card security standards, putting consumers’ confidential information at risk. According to the Verizon Payment …
IP Address Management platform Proteus 3.7 released
BlueCat Networks announced the latest release of Proteus, a scalable IP Address Management (IPAM) platform. Proteus 3.7 delivers enhanced usability, scalability, seamless …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities