Please turn on your JavaScript for this page to function normally.
An in-depth view of IT policy compliance

Qualys announced the release of QualysGuard Policy Compliance 3.0, providing more comprehensive policy compliance scanning capabilities without the need to install agents. The …

Hardware security modules for cryptographic protection

Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …

Organizations still don’t understand application security strategies

Organizations lack a sense of urgency for securing critical data, according to a new report by Application Security. The report found that the greatest challenges to securing …

LogLogic Compliance Manager 2.0 released

LogLogic released Compliance Manager 2.0 which provides users with an executive view into an enterprise’s compliance posture and reduces the time and costs required to …

Lush hack due to numerous security vulnerabilities

The Web site of Lush, the natural ingredients cosmetic firm, has reportedly been cracked and subverted by attackers, with reports that customers’ bank details have …

Think PCI is not beneficial? Think again

In the wake of massive data breaches of payment card information in the past few years, the topic of PCI compliance and its adoption has been top of mind in any organization …

Managed Wi-Fi access and PCI scanning in a single device

AirTight Networks launched Secure Wi-Fi – a suite of managed services which adds Wi-Fi access. With today’s launch, the company offers hosted, cloud-based, secure …

The shape of security and compliance in 2011

With increasingly stringent compliance mandates, a flurry of vendor consolidation, demands for audit reporting, and a spike in complex security breaches, 2010 has been a …

The world of mobile security fears and escalating compliance

2010 was another year of living dangerously. Companies dealt with huge increases in malware threats, growing mobile security concerns about consumer devices such as iPads, and …

Lack of awareness for PCI DSS 2.0

New research by LogLogic has indicated that 13.8 percent of respondents are completely unaware of the new version and 15.5 percent confirm they are only partially aware of it. …

Metasploit achieves CVE compliance

Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security …

Data protection compliance in the EU administration

The European Data Protection Supervisor (EDPS) adopted a policy paper that sets out the framework within which he monitors, measures and ensures data protection compliance in …

Don't miss

Cybersecurity news