compliance - News, Features, and Slideshows
compliance in pictures
Dennis Technology Labs, the London-based organisation which runs tests to evaluate anti-virus software, yesterday released its latest test results on products for three distinct product segments--enterprise, home and small-to-mid-sized business (SMB). Its tests are not sponsored by vendors, the lab says.
By Ellen Mesmmer | 12 July, 2013 21:22
A CIO once quipped, "Security isn't hard, compliance is." And in fact many companies focus their security efforts on meeting compliance requirements. But if you are audit compliant, have you in fact addressed all of your risks, or are you just kidding yourself? Is it better to focus on the risks presuming that doing so will cover you off on the compliance side? Network World Editor in Chief put the question to two practitioners, both of whom come down on the side of risk.
By Christian Anschuetz and Dan Abdul | 22 April, 2013 10:56
In 1995, when I was a university student in Helsinki, I developed a security protocol to protect data-in-transit as it moved throughout our network. I named it the "secure shell," or SSH for short. Today, SSH is used by organizations of all types and sizes as a secure method to move data from machine to machine and provide remote administrator access. From the perspective of an attacker or malicious insider, SSH is an artery that carries vital organizational data.
By Tatu Ylönen, CEO and founder of SSH Communications Security | 01 March, 2013 22:12
Startup Convercent officially debuted today with a software-as-a-service (SaaS) offering that lets employers make available to employees in electronic form, via computer or mobile device, the workplace ethics and compliance terms the business supports.
By Ellen Messmer | 29 January, 2013 17:02
Whitepapers about compliance
This helpful infographic on mobile enterprise management (MEM) details the driving forces behind this new trend, as well important considerations regarding impact on cost, productivity and security. • Increasingly, the devices used for businesses are no longer company-owned, meaning an increase in necessary IT support • Companies are most interested in device management to alleviate security and compliance concerns • BYOD models benefit companies and end users with cost savings, choice, and to demonstrate progressiveness from IT staff
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
Who would have thought that a small piece of plastic measuring a mere 2.125 inches by 3.370 inches could open a window to so much mayhem? Find out to safe guard your PoS terminals from cyber criminals hacking retail networks.
- AMD slims PC chip lineup, hopes to return to profitability by year end
- The first self-driving 18-wheeler hits the highways
- Civil liberties groups oppose bill ending NSA's bulk phone records program
- Microsoft prepares Windows Server 2016 for the container age
- ZTE's bezel-less phone tosses away black border for more touchscreen function
- SAP sets its sights on the IoT with new cloud services
- Citrix's iPad mouse arrives next week
- SAP brings its S/4Hana data platform to the cloud
- MIT says solar power fields with trillions of watts of capacity are on the way
- Lawmakers move to end warrantless surveillance of US residents
- Microsoft won't give up trademark fight over Skype in Europe
- Google senior VP talks about when the company nearly failed
- Microsoft aims to increase confidence in cloud services with better networking
- The Internet of Things to take a beating in DefCon hacking contest
- The Upload: Your tech news briefing for Wednesday, May 6