0611 cover
There probably always will be some indifference to breach notifications, but I'd like to hope that today's average, technology-reliant consumer isn't blissfully trusting that businesses ...
News briefs from the past month regarding Sony, the FBI, privacy concerns, Amazon and other breaking stories.
Zscaler appointed Lane Bess chief operating officer, Jeff Moss appointed CSO of the Internet Corp. for Assigned Names and Numbers (ICANN), and more personnel announcements ...
The Sony PlayStation Network/Qriocity service breach of 77 million records contained a twist that makes it dangerous.
In a potentially precedent-setting court ruling, a federal judge declined to dismiss a lawsuit filed against RockYou over a breach that exposed millions of user ...
A need for risk managers with specific skills in business continuity planning and disaster recovery.
Cybercriminal activity across the globe, plus a roundup of security-related news.
Ashwin Altekar, security risk manager at Heartland Payment Systems, says he must first understand the level of risk that technologies create for customers, and then ...
The U.S. government was justified to take control of Coreflood bot servers.
Using third-party cloud services, enterprises can quickly and affordably increase and decrease service or compute power at will.
The explosion of internet-connected mobile devices, combined with the rapid move to cloud-based IT infrastructure and applications, is a security headache of epic proportions for ...
The ability to ascertain the risk tolerance of the business gives us a benchmark to hit as opposed to just "guessing" and then getting political ...
Letters from our readers responding to news and opinion items on our website and feature stories and other items in our print magazine.
With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.
A new nonprofit, with roots at the Kennedy Space Center, isn't concerned about shuttle launches and landings, but wants to be the facilitator for the ...
Despite the fact that reports often stress the need for robust government and industry partnerships, they've been slow to take shape. What has held back ...
The so-called "zero-trust" model - making security ubiquitous throughout the network and not just at the perimeter - offers a fresh way of thinking about ...
Data discovery is a fundamental factor in risk mitigation, says PixAlert CEO Gerard Curtin.
The risk environment is becoming more complicated as time goes on and criminals become more and more sophisticated.
The AlgoSec Security Management Suite offers a two-piece firewall compliance and management product.
This product features some very powerful functionality when it comes to policy and endpoint management.
Change Tracker Enterprise from New Net Technologies (NNT) offers full compliance and configuration for pretty much anything that is connected to the network, including workstations, ...
INNERspace from Promisec provides full endpoint policy management in the large enterprise.
With Tripwire Enterprise, administrators can easily manage many compliance standards.
The Security Suite from Tufin Technologies provides a two-piece approach to managing network device policy and auditing.
A purpose-built GRC solution that brings together threat and vulnerability data, security configuration data, compliance requirements and risk assessments.
SecureGRC is a cloud-based, software-as-a-service (SaaS) enterprise application that provides security and regulatory compliance management.
Lightwave Security’s Secure-Aware is a risk and compliance management and reporting platform supporting industry-standard frameworks, such as ISO 2700x, PCI DSS and COBIT 4.1.
MetricStream Risk Management Solution v6.0 enables organizations to identify, assess, quantify, monitor and manage their enterprise’s operational and IT risks.
Modulo Risk Manager v7.2 provides an easy-to-use, flexible, comprehensive risk management solution to automate the process of identifying, analyzing, evaluating and treating risks across the ...
RedSeal Systems develops security posture management solutions that allow organizations to assess and strengthen their cyberdefenses to quickly adapt to ever-changing threats and business conditions.
RedSeal Systems develops security posture management solutions that allow organizations to assess and strengthen their cyberdefenses to quickly adapt to ever-changing threats and business conditions.
Rsam Framework and Rsam Risk & Compliance Management Module is designed to effectively identify, assess, manage and mitigate risks, while providing enterprise-wide visibility, oversight and ...
Skybox Security provides a portfolio of automated tools. Skybox Risk Control and Skybox Network Assurance v5.5 can be used separately or together to help organizations ...
McAfee’s ToPS for Compliance proactively correlates threats with system state data, such as vulnerability, patch level, configuration and application information.
What, in terms of security, should you expect from your cloud provider?