Security Experts:

long dotted


The PCI Security Standards Council (PCI SSC), the standards body that oversees the Payment Card Industry Data Security Standard (PCI DSS), has released a preview of PCI DSS 3.0, which is scheduled to be published on Nov. 7, 2013
CSC announced a solution to help enterprises manage regulatory and compliance mandates for cybersecurity.
BeyondTrust has released free tool designed to provide organizations with the ability to track and understand configuration changes and administrative activities for security and compliance reporting for Google Apps.
Security response personnel at Stanford University are investigating a security breach that may have exposed sensitive information of users of Stanford University Network (SUNet) computer system.
HyTrust has entered into a strategic investment and technology development agreement with In-Q-Tel (IQT), the not-for-profit, venture capital arm of the CIA.
Tripwire launched NERC Solution Suite, a combination of customized tools and services designed to help utilities automate, achieve and maintain NERC Critical Infrastructure Protection (CIP) compliance.
The ISO/IEC 27034-1 offers a "common validation language" for security development practices and offers organizations a clear and simple outline for adopting a security development framework.
Protecting the database means more than just persistent data security, it also means defining access controls and auditing and enforcing policy.
Red Hat has completed seven new FIPS 140-2 certifications from the U.S. government’s National Institute of Standards and Technology.
A new report from McAfee outlines the growing risks in the sales and commerce industry, due in part to the mix of legacy and newer Point of Sale (POS) systems, in addition to secondary market hardware.


rss icon

Oliver Rochford's picture
To a security guru, GRC feels like a waste of time. It will provide artificial challenges that make a difficult task even harder, with very little gain or advantage in return other than a report containing lists of items with a marked checkbox.
Michael Goff's picture
In 2011 we were reminded that software piracy cannot be stopped. Despite the best efforts of software vendors, industry watchdog groups and government, software piracy continues to proliferate.
Mandeep Khera's picture
Merchants who are required to be PCI-DSS Compliant will have to get their validation under provisions of PCI-DSS 2.0 by December 31st, 2011. What are some of the key changes in PCI-DSS 2.0? Are you ready?
Chris Hinkley's picture
Mobile applications and the platforms they are built on make PA-DSS compliance difficult due to the rapidly evolving threat landscape. With increased attacks and their tragic affects on businesses and consumers, it's important to make make sure your mobile operations properly secured.
Chris Hinkley's picture
2011 has been a monumental year for hackers. Businesses as well as consumers felt the brunt of cybercrime by the millions, some of them a few times over. Here’s a look at the top hacks so far this year, and what we can learn from them.
Chris Poulin's picture
A properly deployed SIEM can add tremendous value to an organization’s security program. This week, Chris describes how you can get the most out of an SIEM solution through proper deployment strategies.
Chris Hinkley's picture
Real security goes beyond compliance, and integrates with validation and security processes. This causes confusion for many organizations as they pursue compliance standards. So let’s break it down.
Jon-Louis Heimerl's picture
If you are faced with regulatory compliance, you are faced with a legal issue. And, if you are not compliant, you are essentially breaking the law. There are many standards and regulations in place. But which ones are the most impactful?
Jeff Hudson's picture
Too many IT and risk managers are surprised by security breaches, compromised keys or operational failures that occur from sheer neglect that result when you leave your valuable keys as exposed as a password on a post-it. Hefty, potential fines for failing to comply with regulations are risk enough, but the risks of ignoring these vulnerabilities extend even further.
Michael Goff's picture
By tracking the adoption of unlicensed software, your company can turn the age-old piracy problem into revenue generating business unit as well as source data for marketing. Here’s how.