Security: Regulations & Standards


Q&A: Regulations and Security Drive Organizations to Adopt Frameworks

Why organizations are increasingly adopting the IT Infrastructure Library

Why Colleges Fail the Privacy Test

Most college Web sites lack online privacy policies. What does that say about their ability to secure people’s private information and to avoid data breaches?

Executives Unhappy with Current Security Metrics

Faced with decreased security spending and executives who decry the state of security reporting, security managers need better report-writing skills.

Web Services Gets SPML 2.0 Boost

New standard specifies XML framework for identity management and provisioning

New York Sues Over Alleged Spyware

Speaking a language spyware purveyors understand: fines and jail time

Regulations Spur Adoption of Network Access Control

Regulated companies are increasingly adopting NAC to screen network access, enforce security policies, and block malware outbreaks.

Forty Million Stolen Identities Later: Learning from CardSystems' Breach

After the largest known compromise of personal information, the FTC details the information security failures that helped caused it.

The Push for Federated Identity Management

The growth in Web Services and service-oriented architectures enables businesses to more quickly and automatically trade information and computing resources. Now it’s up to federated identity management to secure it.

Do You Trust Your Storage to Mitigate Mobile-Device Threats?

Increasing numbers of mobile users and poor laptop security management creates a growing risk; a new specification pushes trusted-storage applications

Q&A: Balancing E-Mail Security and Compliance

How quickly can you search and retrieve e-mail and instant messages relevant to a regulatory inquiry or court-ordered discovery process?

Spinning Can-Spam

The FTC says federal anti-spam legislation is effective. Experts disagree.

The Shape of Endpoint Security to Come

Will 2006 be the year of endpoint security? A number of network-access-control approaches are finally coming to fruition.

Beyond Malware, SOX, and Data Breaches: The 2006 Security Forecast

Regulations, application vulnerabilities, data breaches, and evolved malware accounted for 2005’s top security trends. We look ahead to what’s in store for 2006.

Q&A: The Future of Security, Control, and SOX Compliance

Sarbanes-Oxley compliance started chaotically. By its second year, however, many organizations were investigating how automated controls could help them see SOX not as an annual cost but as a way to reduce business risk. What’s in store for year three?

Regulations Driving E-mail, IM Backup and Recovery

Thanks to a variety of regulations, businesses must retain e-mail and instant messages, creating an information glut. Here’s how to manage it.

How Data Security Breaches Hit the Bottom Line

A new survey reveals the best way to deal with breaches

Regulations Drive Whole-Disk Encryption

With the average public data breach costing $7.5 million to clean up, security managers seek automated hard disk encryption.

Q&A: Harnessing Trusted Computing Modules

Planning identity management or authentication rollouts? Don’t forget to factor in the Trusted Computing Modules now built into many PCs.

Sarbanes-Oxley: Enterprises Turning to Automation

Automated security and access controls get top attention as enterprises move into their second year of Sarbanes-Oxley compliance.

Web Services: Where Identity Management Goes From Here

SAML, Liberty, WS-Federation—a number of Web Services standards are competing for security managers’ attention. Here’s how to differentiate between the options.