Compliance

Insider threat: The emerging policy landscape & best practices

Retired Senior Executive,CIA - Insider Threat Detection, Larry Knutsen, will review the evolution of U.S. policy on insider threats and what they mean to your organization.

PCI Council updates penetration testing guidance for merchants

By

A recent Verizon study found that regular testing of security systems was a compliance weak point for merchants.

Federal Reserve Bank of New York creates cybersecurity team

By

Sarah Dahlgren, the New York Fed's head of supervision, announced that the bank had created a team dedicated to cybersecurity.

Russian hacker to be extradited to U.S. from Spain

By

A Russian man who was arrested in Spain on suspicion of cyber fraud reportedly will be extradited to the U.S. within the next few days.

Obama Administration sets record for withholding FOIA requests

By

The Obama administration has set another record for withholding government files under the U.S. Freedom of Information Act.

Verizon: PCI requirement to test security systems a compliance weak point for orgs

Verizon: PCI requirement to test security systems a compliance weak point for orgs

By

The percentage of companies compliant with PCI DSS Requirement 11 dropped to 33 percent last year, a Verizon report found.

Cracking the confusion between encryption and tokenization

Today there are more options for securing enterprise data than ever before. Yet with so many approaches, choosing the best fit isn't always an easy decision.

Obama criticizes Chinese cybersecurity regs

By

President Obama told Reuters that cybersecurity requirements proposed by China need to change if the country wants to do business with the U.S.

In historic vote, FCC approves strong net neutrality rules

By

The rules, approved Thursday, ban ISPs from charging for internet "fast lanes," or blocking legal internet services.

Planning for PCI compliance in the cloud

Virtualization changes everything. The agility and cost efficiencies enabled by virtualization and the cloud are beneficial, as long as you understand why virtualization requires different security.

Defense from the top: FISMA

Defense from the top: FISMA

By

The DHS will gain more control - and federal cybersecurity likely will be improved - when a FISMA update is passed, reports Lee Sustar.

News briefs: North Korea behind the Sony breach and a landmark HIPAA settlement

News briefs: North Korea behind the Sony breach and a landmark HIPAA settlement

By

President Obama imposed sanctions against North Korea, a medical services provider will be forced to pay a "neglect" penalty over HIPAA violations, the House passed the Intelligence Authorization Act, and other security news.

FCC warns businesses: Wi-Fi blocking prohibited

By

In an attempt to put the issue to rest, the agency warned businesses against blocking guests' personal hotspots.

Don't dismiss internal data breaches as minor - they aren't!

Don't dismiss internal data breaches as minor - they aren't!

The wolf isn't at your door, it's inside. Ignorance is definitely not bliss. Just ask any of the regulatory agencies.

Identity requirements for risk and compliance - what you need to know

Identity is a critical component of proving compliance. Whether complying with industry regulations or security best practices, your auditors need to know who has access to what servers and data as well as who exactly did what, where and when.

PCI compliance not synonymous with security, panel says

PCI compliance not synonymous with security, panel says

By

A panel held during the annual NRF conference discussed ways that retailers could bolster security.

After FCC fine, Marriott says it won't block guests' Wi-Fi networks

By

Last October, the FCC came after Marriott with a $600,000 fine.

NJ law requires health insurance carriers to encrypt sensitive data

By

New Jersey Governor Chris Christie signed the legislation last Friday.

HITRUST adds privacy controls to Common Security Framework

By

The privacy controls will be added to version 7 of HITRUST's CSF due out later this month.

Why compliance matters

Why compliance matters

Part of my role requires me to ask questions that an auditor might. This is especially true when it comes to compliance, why it matters, and how it makes a difference.

FIDO Alliance publishes UAF, U2F specs

By

The alliance defined specifications for devices, servers and client software that will help usher in the "post password" era.

The proliferation of mandates

The proliferation of mandates

The reality of ubiquitous reliance on ICT has given rise to the criticality of cyber security, says Cisco CSO Edna Conway.

TRUSTe settles FTC charges over its 'certified' privacy seals

TRUSTe settles FTC charges over its 'certified' privacy seals

By

The company has agreed to pay $200,000 as part of the settlement, and will be required to beef up its COPPA-related reporting activities.

VA falters in cybersecurity audit for 16th year

By

Veterans Affairs has failed an annual cybersecuirty audit for the 16th year in a row, a new report reveals.

Secure agile development: Why can't we all get along?

Security teams are sharply focused on bringing security to applications and meeting compliance requirements in the delivery of these applications and services.

Network care: Case study

Network care: Case study

By

When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.

The auditor's case for continuous compliance

The auditor's case for continuous compliance

Whether it's for PCI compliance or HIPAA assessments companies follow the conventional model of point-in-time certification accompanied by a costly and painful annual review and correction process.

Google updates piracy-fighting report

By

The search engine company updates it piracy report to let users know how its adjusting search results to stop illegal piracy efforts.

Marriott to pay $600K fine for blocking guests' Wi-Fi networks

By

The FCC launched an investigation last year after a consumer complained of the practice.

Protecting the vault: First Financial Bank's go-to solution

Protecting the vault: First Financial Bank's go-to solution

By

Needing more than signature-based remedies, First Financial Bank found a way to close the gap between what exists and what's possible. Greg Masters reports.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US