compliance
An in-depth view of IT policy compliance
Qualys announced the release of QualysGuard Policy Compliance 3.0, providing more comprehensive policy compliance scanning capabilities without the need to install agents. The …
Hardware security modules for cryptographic protection
Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …
Organizations still don’t understand application security strategies
Organizations lack a sense of urgency for securing critical data, according to a new report by Application Security. The report found that the greatest challenges to securing …
LogLogic Compliance Manager 2.0 released
LogLogic released Compliance Manager 2.0 which provides users with an executive view into an enterprise’s compliance posture and reduces the time and costs required to …
Lush hack due to numerous security vulnerabilities
The Web site of Lush, the natural ingredients cosmetic firm, has reportedly been cracked and subverted by attackers, with reports that customers’ bank details have …
Think PCI is not beneficial? Think again
In the wake of massive data breaches of payment card information in the past few years, the topic of PCI compliance and its adoption has been top of mind in any organization …
Managed Wi-Fi access and PCI scanning in a single device
AirTight Networks launched Secure Wi-Fi – a suite of managed services which adds Wi-Fi access. With today’s launch, the company offers hosted, cloud-based, secure …
The shape of security and compliance in 2011
With increasingly stringent compliance mandates, a flurry of vendor consolidation, demands for audit reporting, and a spike in complex security breaches, 2010 has been a …
The world of mobile security fears and escalating compliance
2010 was another year of living dangerously. Companies dealt with huge increases in malware threats, growing mobile security concerns about consumer devices such as iPads, and …
Lack of awareness for PCI DSS 2.0
New research by LogLogic has indicated that 13.8 percent of respondents are completely unaware of the new version and 15.5 percent confirm they are only partially aware of it. …
Metasploit achieves CVE compliance
Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security …
Data protection compliance in the EU administration
The European Data Protection Supervisor (EDPS) adopted a policy paper that sets out the framework within which he monitors, measures and ensures data protection compliance in …