Security: Regulations & Standards


Minding the Gap: Security Vendors Look to Plug Holes in Suite Offerings

Security vendors are stepping up their efforts to close the gap between security and operations

ID Theft Red Flags: The Challenge for IT

What enterprises and IT must do to enhance their risk-management program.

A New Standard for Securing Optical Storage

How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.

Q&A: Security Information and Event Management

Why current security tools aren’t adequate, and what vendors and IT must do now to secure their environment.

Getting the Most from Your UTM

New research from Aberdeen shows how Best-in-Class companies are getting the most out of unified threat management technologies and services.

Q&A: Securing Mobile Devices

How to handle the special security risks posed by portable devices

Experts Advocate Multi-Purpose Approach to Fight Fraud

With the right investigative techniques, experts maintain, fraud-busters can connect the dots, uncover evidence, and combat fraud

Compliance, New Threats Drive Security Spending

Enterprise security is an expensive proposition – one that's likely to get even more expensive as organizations take steps to protect themselves.

8 Best Practices for Encryption Key Management and Data Security

From centralization to support for standards, these encryption key management and data security best practices can help you protect your organization’s confidential data and comply with regulatory mandates.

Survey Says Insider Theft Tops CIO's Worry List

Why the threat of theft-from-within is keeping enterprise CIOs up at night

Federal Agencies Lag in Security Preparedness

When it comes to ensuring compliance with information security rules or best practices, a substantial minority of federal agencies still aren’t making the cut

Latest Compliance Regulation Tackles Identity Theft for Enterprises Large and Small

Firms that extend credit to consumers and small businesses must comply by November 1

Security: Batten Down the (IM) Hatches

IM attacks are on the rise, in part because organizations are deploying unified communications platforms without first hardening them against attacks

Web Attacks on the Rise; E-mail Attacks Decline

During the first three months of 2008, security researcher Sophos identified about 15,000 freshly infected Web pages every day

How Identity Management Complements ERP

Enterprise resource planning (ERP) applications can automate business processes but do nothing to solve security problems. Identity management software, working in tandem with ERP, can help.

Why IT Must Act Now to Meet New PCI Data Security Standards

A bevy of vendors -- including most prominent services providers -- have announced new payment card industry-oriented services.

Windows XP SP3: T-Minus Four Weeks and Counting?

Industry watchers speculate that the third service pack for Windows XP -- complete with security-related features -- could appear soon

Report Urges IT: It’s Time to Guard against the "Millennial" Threat

New IT consumers are more comfortable with, and knowledgeable about, technology, and that’s a problem

Grocery Chain’s Data Breach Extends Security Debate

Over 1,800 known cases of fraud result from data breach

Web 2.0 Pushes Need for Defensive Application Development

The Web 2.0 paradigm shift is fraught with both promise and danger