Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week. Over the past few years, the ...
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts. Over the past few years, the security strategies of many companies and ...
Tags: IT security strategies, emerging cyber threats, security strategies
IT Governance Ltd, the PCI and information security experts, are advising organisations which must comply with the PCI DSS requirements, that successful implementation of the standard can only be achieved through well trained staff. The ...
Klinikum Wels-Grieskirchen hospital in Austria has shortened application log-in and log-out times,as well as securing password management,after deploying Imprivata in its VMware environment. Klinikum Wels-Grieskirchen is the fifth-largest ...
Tags: Austrian hospital, patient data, imprivata
A survey released by Lieberman Software Corporation has revealed that half (51%) of IT experts whose job roles focus on the cloud don’t trust the cloud for any of their personal data such as contact lists, music, photos, or Webmail. ...
Recent PCI Security Standard Council's North American Community Meeting revealed PCI compliance changes. PCIHosting.com helps individuals and organizations prepare for the changes. New standards in PCI compliant services and ...
Tags: PCIHosting, PCI, Computer Products
IT Governance Ltd, the PCI and information security experts, have reported that organisations required to comply with the PCI DSS standard, are increasingly deploying PCI DSS Staff Awareness e-learning to meet requirement 12.6 of the ...
Tags: PCI DSS, PCI DSS Standard, information security experts
Cloud computing is all about cutting costs, but some organisations that are going down that road are reporting increased cost instead. How is this possible? According to Marc Noble, director of government affairs for (ISC)2, he knows of ...
Tags: cloud computing, Marc Noble, cloud implementation, cloud services
Camouflage Software Inc., a leading provider of data masking solutions designed to protect sensitive information in non-production data stores, is pleased to announce the latest release of the company's flagship software product, Camouflage ...
Tags: Camouflage Software, data masking solutions, flagship software, software
These products help organisations achieve certification and implement complex frameworks that would otherwise have unnecessarily cost them thousands of Euros. The growing range of toolkits covers most IT disciplines, including ITIL, ...
Tags: certification, implement complex framework, IT Governance, IT industry
This is especially true of organizations subject to compliance with regulations like PCI-DSS or HIPAA, but any organization could find itself in trouble if it can't get its hands on emails and SMS messages during an ediscovery process. ...
Tags: IT, HIPAA, forensic investigations, mobile devices
Just over half of IT professionals who focus on cloud computing do not trust cloud services for any of their personal data,a survey has revealed. Some 86%of those polled by Lieberman Software said they do not trust the cloud for their ...
Tags: IT pros, cloud service, cloud computing, IT security, Lieberman
OmniPark, a leading provider of parking management products and services, is pleased to announce the release of PayMyNotice, a parking solution that encourages guests to pay notices promptly. SPOKANE, WA, November 02, 2012 ...
Tags: parking management products, parking solution, OmniPark
Salaries for most information security professionals are continuing to trend upward as demand increases, particularly for technical skills. According to the latest figures from recruitment specialist Acumin, the skills most in demand are ...
Tags: recruitment firm, technical skills, specific areas, e-discovery
Security experts believe passwords offer little or no protection from unauthorised access to corporate IT systems and online accounts, and now Intel is working on an alternative. An increasing number of data breaches are being blamed on ...
Tags: Intel, unauthorised access, IT systems, online accounts