compliance
SpyEye Trojan attacks Verizon’s online payment page
Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …
Compliance is more than just cost
Compliance investments, which are basically treated only as a spending to align with compulsory regulations, when extended to all processes including privileged and super …
Rapid adoption of hosted email compliance
Financial institutions are rapidly moving to hosted email compliance and storage services to deal with increasing costs, risks and regulations, according to a study conducted …
Page-integrated encryption for protecting credit cards on the web
Voltage Security announced a new encryption breakthrough for protecting personal data entered by consumers on web pages called PIE for Page-Integrated Encryption. The company …
Compliance violations via email increase
In a study of how professionals use, and companies manage, email – particularly the handling of private and confidential information – VaporStream found that …
Regulatory compliance is a top concern in 2011
Regulatory compliance will be the top business issue affecting enterprise IT in the next 12 months, according to a new survey of more than 2,400 ISACA members from 126 …
PCI DSS compliant companies suffer fewer data breaches
While the majority of PCI compliant organizations suffer fewer or no breaches, most practitioners still do not perceive PCI-DSS to have a positive impact on data security, …
Sourcefire expands IPS solutions portfolio
Sourcefire has expanded its IPS solutions portfolio on three fronts with: Sourcefire IPSxTM – A streamlined, easy-to-manage IPS Sourcefire 4.10 software release – …
IT data management concerns
LogLogic announced the findings to an IT Data Management survey carried out amongst 164 IT managers and directors. The research aims to establish how IT data is being managed …
Maturity model for information security management
The Open Group announced a new information security management standard, The Open Group Information Security Management Maturity Model (O-ISM3), which enables the creation of …
Data breach mistakes feared more than attackers
Seventy percent of compliance professionals feel that their organizations are well or very well prepared to fend off malicious hacker attacks, however, their confidence wanes …
Automated security analysis
Security would be easy if it wasn’t for all the changes, as any IT manager will tell you. Other sectors of IT, such as CRM or ERP, can continue to function efficiently …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility