Recent PCI Security Standard Council's North American Community Meeting revealed PCI compliance changes. PCIHosting.com helps individuals and organizations prepare for the changes. New standards in PCI compliant services and ...
Tags: PCIHosting, PCI, Computer Products
A group of UK workers are driving the use of consumer devices in the workplace and are risking being sacked as a result, according to research. A Unysis commissioned survey of over 350 workers and over 95 IT decision-makers in the UK, ...
Tags: UK, consumer devices, IT decision, IT
Real time defence of business data and IT users through the use of next generation security information and event management (SIEM). Traditional IT security defences have been built using point security products. These are good for ...
Tags: business data, IT, security information, event management
Companies must take responsibility for cyber security at board level to tackle the exponential growth in attacks, the government has urged. The warning comes as ministers launch a Cyber Security for Business booklet to encourage company ...
IDG News Service - The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats. The Commission released an online tool called the "Smartphone ...
Tags: FCC, security advice, smartphone, mobile devices.data
The U.S. government needs a comprehensive doctrine addressing cybersecurity instead of the current patchwork of policies and agencies dealing with cyberthreats, according to a group of experts. The lack of an overarching cybersecurity ...
Tags: U.S.government, cybersecurity, cyberthreats, experts
Global oil and gas transactions have suffered a modest decline in both deal count and total value in the H1 of 2012. According to Mergers and Acquisitions in the Oil and Gas Industry, however, increasing merger & acquisition interest by ...
Tags: Energy, oil, gas, Acquisitions, Mergers, based energy, petroleum
Intel hopes security features from McAfee will help the company differentiate its mobile chips from its rivals', according to Intel's software chief Renee James. The security threats posed to handheld devices are escalating, and chip ...
Tags: Intel, ecurity features, McAfee, mobile chips
WatchGuard Technologies has announced the availability of its latest Extensible Content Security(XCS)solutions for small and mid-sized businesses.The new XCS 280 and XCS 580 models offer the same trusted content protection but with ...
Tags: WatchGuard Technologies, XCS, Security, centralised management dashboard
Intrusion prevention systems -- security tools designed to stop problems even before they crop up -- have emerged as indispensable components of defense-in-depth security strategies. But a key success factor for the technology is it ...
Tags: Intrusion prevention systems, IPS, security tools, security strategies
Sourcefire announced today it has strengthened and expanded its FirePOWER appliance family, providing users with the unmatched ability to protect against sophisticated malware, advanced persistent threats (APTs) and targeted attacks. One ...
Tags: advanced malware protection, advanced persisted threats, APT, firepower
Fiberlink, a global leader in software-as-a-service (SaaS) solutions for application management and secure mobile device management announced a free on-demand webinar titled "Squashing the Top 5 Mobile Security Threats." Enterprise ...
Tags: Fiberlink, software, software service, application management
New York City is using a new data aggregation and real-time analytics tool to combat crime and terror threats in the city. The new Domain Awareness System (DAS), developed jointly by the New York Police Department and Microsoft, gives ...
Tags: New York Police Department, Microsoft, DAS, analytics tool
The Greater London Authority (GLA) has rolled out a cloud-based incident management tool to record and track non-compliance issues, security threats and fraud. The web-based Xactium Incident Manager application gives users real-time ...
Tags: cloud-based, incident management tool, non-compliance issues
About five years ago Genomic Health began to introduce cloud-based business applications. Ken Stineman, senior director of enterprise architecture and security, quickly became aware of the security risks these apps posed. CSO contributor ...
Tags: Genomic Health, cloud business applications, security, apps