compliance
How to secure a moving target with limited resources
Today, as security threats increase and regulatory requirements grow more complex, businesses are recognizing that compliance and security are business-critical priorities. …
Demonstrating compliance effectiveness a top priority
71 percent of banks, 72 percent of insurance companies and 84 percent of other financial services organizations believe that demonstrating compliance effectiveness is a top …
Simplified security policy management
The consumerization of IT can bring new workforce efficiencies, as well as potentially devastating enterprise security and compliance risks. As organizations grapple with the …
Layered approach to enterprise data security
GreenSQL launched its Enterprise Edition for Unified Database Security which offers security, caching, auditing and masking in one package, ensuring that enterprise databases …
Tenable releases SecurityCenter 4.2
Tenable Network Security announced SecurityCenter 4.2, a solution for enterprise-grade information protection and compliance. SecurityCenter 4.2 makes it faster and easier for …
Android URL Filtering SDK: Secure Web browsing and compliance
Commtouch announced GlobalView URL Filtering for Mobile, which enables real-time protection for mobile device users browsing the Web. GlobalView URL Filtering is comprised of …
Network security scanning and patch management
GFI LanGuard is a network security and vulnerability scanner which provides a complete network security overview, while also providing remedial action through its patch …
PCI Security Standards Council announces PCI awareness training
The PCI Security Standards Council announced that PCI Awareness online training is now available. An introductory level course, the four hour training is designed for anyone …
Most organization experienced data loss
75% of UK organizations experienced data loss in the last year, compared with an average of 77% internationally, according to Check Point. Key findings from the survey show …
Mobile users: Risky behavior and weak security
Researchers found that while an increasing number of consumers use mobile devices for both business and personal activities, large numbers are not familiar with their …
SpyEye Trojan attacks Verizon’s online payment page
Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …
Compliance is more than just cost
Compliance investments, which are basically treated only as a spending to align with compulsory regulations, when extended to all processes including privileged and super …