Data governance, risk, compliance and much more
compliance - News, Features, and Slideshows
compliance in pictures
Over 60 per cent of companies assessed by Verizon were compliant with one or more Payment Card Industry Data Security Standards (PCI DSS) requirements in 2014 according to the vendor’s latest report.
Dennis Technology Labs, the London-based organisation which runs tests to evaluate anti-virus software, yesterday released its latest test results on products for three distinct product segments--enterprise, home and small-to-mid-sized business (SMB). Its tests are not sponsored by vendors, the lab says.
A CIO once quipped, "Security isn't hard, compliance is." And in fact many companies focus their security efforts on meeting compliance requirements. But if you are audit compliant, have you in fact addressed all of your risks, or are you just kidding yourself? Is it better to focus on the risks presuming that doing so will cover you off on the compliance side? Network World Editor in Chief put the question to two practitioners, both of whom come down on the side of risk.
In 1995, when I was a university student in Helsinki, I developed a security protocol to protect data-in-transit as it moved throughout our network. I named it the "secure shell," or SSH for short. Today, SSH is used by organizations of all types and sizes as a secure method to move data from machine to machine and provide remote administrator access. From the perspective of an attacker or malicious insider, SSH is an artery that carries vital organizational data.
Startup Convercent officially debuted today with a software-as-a-service (SaaS) offering that lets employers make available to employees in electronic form, via computer or mobile device, the workplace ethics and compliance terms the business supports.
Whitepapers about compliance
Organisations are readily launching BYOD programs to boost employee productivity and reduce costs. But this all comes at a risk and you maintain your vigilance in sustaining compliance with data security and privacy regulations. This whitepaper looks at several best practices are key for maintaining regulatory compliance with any BYOD program.
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- See Your Traffic for What It Really Is
- Harnessing the Power of Metadata for Security: FIND OUT MORE
- Check your Future Risk
- How to Use Metadata to Make Data-Driven Decisions - Download NOW!
- The Future is Encrypted. Manage It.
- The Future is Encrypted. What's your defense?