Security Manager's Journal: SOX is Out of Control
Complying with the act is consuming more and more time and detracting from real security work
View ArticleCloud, BYOD Increases Need for Automated IAM Systems
As traditional security concepts of perimeter and end-point defense break down as a result of the proliferation of cloud services and the BYOD phenomenon, enterprises are increasingly feeling the need...
View ArticlePC Users Admit to Pirating Software--$63 Billion Worth of It
Software trade association reports that surging PC usage in emerging markets contributed to the economic losses from piracy; more than half of respondents to new survey admit that they pirate software...
View ArticleCloud Computing: You Can't Outsource Your Compliance Obligations
Even if your cloud provider is at fault should your company fall out of compliance, the law will come after you.
View ArticleBig Data for Marketing: Respect Consumer Privacy or Get Burned
Marketers are increasingly looking to Big Data to provide the insight they need to create richer, more personalized and more targeted messaging for consumers. But collecting that data without making...
View ArticleLinux Foundation Adds Three Members: Calxeda, Reaktor and Antelink
The Linux Foundation announced today that three new companies -- data center specialist Calxeda, open-source network compliance provider Antelink, and consultants Reaktor -- have become members.
View ArticleHow to Secure Data by Addressing the Human Element
Your sensitive data is only as secure as the weakest link in your organization, and in many cases the weak link is your employees. A properly established security awareness and training program can pay...
View ArticleDell Expands Private Cloud Offerings
Dell on Thursday said it will offer dedicated servers in its data centers and off-premises application and storage services for companies looking to establish private clouds.
View ArticleHow IT Can Prepare for Mobile Forensic Investigations
If your IT security team must comply with regulations like PCI-DSS or HIPAA, you need to know who accesses your data and what they do with it, even if they're using a mobile device to do it. But...
View ArticleEmployees Engage in Rogue Cloud Use Regardless of Security Policies
Studies show that employees are engaging in rogue use of the cloud, even when IT organizations say they have clear formal cloud policies and penalties for violation of the policies.
View ArticleHow IT Departments Can Prepare for a Software License Audit
As revenue for new software licenses is down, software vendors are focusing more on licensing audits to recover some of that lost income. Here's a look at some of the steps a corporate IT organization...
View ArticleEMC Offers Online File Sharing With On-Premise Storage Product
EMC is building on its acquisition of the Syncplicity file-sharing and collaboration service by combining it with its Isilon scale-out NAS to provide the enterprise what the storage giant claims...
View ArticleStartup Service Targets Electronic Workplace Compliance, Training
Startup Convercent officially debuted today with a software-as-a-service (SaaS) offering that lets employers make available to employees in electronic form, via computer or mobile device, the workplace...
View ArticlePCI Council Releases Guidelines for Cloud Compliance
A new set of guidelines from the PCI Security Standards Council is intended to help merchants and cloud services providers comply with the PCI DSS when handling payment card data on the web.
View ArticleIs Stolen IP Walking in the Door With New Employees?
More than half of employees who left or lost their jobs in the past 12 months took confidential corporate data with them and most plan to use it in their new jobs, creating the potential for IP...
View ArticleIT Security Managers Too Focused on Compliance, Experts Say
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this...
View ArticleHow to Downgrade From Windows 8 (Hint: The First Step Is to Know Your Rights)
For a variety of reasons, some businesses are looking to downgrade from Windows 8 to Windows 7. The good news is that Microsoft's business licenses come with downgrade rights, but the catch is that the...
View ArticleStraight Talk on Security Gets Employees to Listen -- and Comply
From phishing your own employees to sharing your company's hack history, these techniques can help you get -- and keep -- users' attention about security.
View ArticleCompliance vs. Risk in Enterprise Security
A CIO once quipped, "Security isn't hard, compliance is." And in fact many companies focus their security efforts on meeting compliance requirements. But if you are audit compliant, have you in fact...
View ArticleHow IT Can Achieve Operational Resiliency
Today's complex IT environments make maintaining 'always on' availability more challenging than ever before, even as IT has become central to most business operations. IDC's David Tapper says...
View Article
More Pages to Explore .....