Please turn on your JavaScript for this page to function normally.
How to secure a moving target with limited resources

Today, as security threats increase and regulatory requirements grow more complex, businesses are recognizing that compliance and security are business-critical priorities. …

Demonstrating compliance effectiveness a top priority

71 percent of banks, 72 percent of insurance companies and 84 percent of other financial services organizations believe that demonstrating compliance effectiveness is a top …

Simplified security policy management

The consumerization of IT can bring new workforce efficiencies, as well as potentially devastating enterprise security and compliance risks. As organizations grapple with the …

Layered approach to enterprise data security

GreenSQL launched its Enterprise Edition for Unified Database Security which offers security, caching, auditing and masking in one package, ensuring that enterprise databases …

Tenable releases SecurityCenter 4.2

Tenable Network Security announced SecurityCenter 4.2, a solution for enterprise-grade information protection and compliance. SecurityCenter 4.2 makes it faster and easier for …

Android URL Filtering SDK: Secure Web browsing and compliance

Commtouch announced GlobalView URL Filtering for Mobile, which enables real-time protection for mobile device users browsing the Web. GlobalView URL Filtering is comprised of …

Network security scanning and patch management

GFI LanGuard is a network security and vulnerability scanner which provides a complete network security overview, while also providing remedial action through its patch …

PCI Security Standards Council announces PCI awareness training

The PCI Security Standards Council announced that PCI Awareness online training is now available. An introductory level course, the four hour training is designed for anyone …

Most organization experienced data loss

75% of UK organizations experienced data loss in the last year, compared with an average of 77% internationally, according to Check Point. Key findings from the survey show …

Mobile users: Risky behavior and weak security

Researchers found that while an increasing number of consumers use mobile devices for both business and personal activities, large numbers are not familiar with their …

SpyEye Trojan attacks Verizon’s online payment page

Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …

Compliance is more than just cost

Compliance investments, which are basically treated only as a spending to align with compulsory regulations, when extended to all processes including privileged and super …

Don't miss

Cybersecurity news