Security: Regulations & Standards


New Data Security Standards Set for Utilities

New regulations mandate increased security for utilities' supervisory control and data acquisition systems

Evaluating the New ISO 17799 Standard

ISO 17799, the world’s most-used information security framework, gets updated.

Regulations, Fear Driving More-Secure Code Development

To counter security threats, developers can reverse-engineer their products, or take a less expensive and more effective approach

Q&A: The State of Endpoint Security

Organizations can derive the benefits of endpoint-security standards without the standards

Giving Users Control of E-mail Archiving for Compliance

Automated backups for compliance are essential in regulated industries, yet sometimes users need to make their own sets of compliance-related e-mails. Enter drag-and-drop archiving.

Securing Admin Passwords: It Takes a Vault

It's difficult to audit administrative passwords if you're not managing them properly. That's what drove Manitoba Lotteries Corp. to employ a password vault.

Case Study: Choosing Hosted Enterprise IM

A financial firm faces regulations for monitoring and retaining IM communications.

In Brief

Beware Standalone Patch Products, Banks Adopt More Security, Improving Can-Spam

Q&A: Moving to Web Services Identity Management

Architecting fine-grained access to Web Services for many users at multiple organizations is difficult to implement or audit using identity management software. We discuss alternatives.

How to Lower Security Compliance Costs

How organizations can get (and stay) compliant while spending less

Case Study: Energy Company Monitors IM

The need to protect its IM users from outside attacks, spam, and regulatory requirements leads Kansas’ largest electric utility to adopt IM monitoring software.

In Brief

CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs

Severity of Spyware Attacks Escalates

Despite dedicated software to defend the enterprise, the economics of spyware leads attackers to respond with more complex attacks or attacks aimed at just one company.

In Brief

Prosecuting Spyware Makers, A New Endpoint Security Standard

Q&A: The Future of Service-Oriented Architecture Security

WS-Security, Liberty, and SAML play nice together

Q&A: How to Secure a Critical Infrastructure

A cybersecurity group works to improve security in the chemical industry.

From One Security Nightmare To Another

Security managers have boosted antivirus and firewall protection, but enterprises may need to switch gears as new regulations target how enterprises handle personally identifying data

In Brief

Symantec Antivirus Vulnerability; New Identity Management Acquisitions; NIST Releases HIPAA Security Guide

Case Study: Bank Audits Vulnerabilities with Security Appliance

Cape Cod Cooperative Bank chooses a dedicated appliance to can its network for vulnerabilities

Lack of Messaging Controls = Regulatory Risk

Mobile phones, lack of policies expose the enterprise