March 02, 2015 Added by:Barracuda Networks
The PCI DSS 3.0 is here. Since Jan 1, 2015 organizations under its purview are required to comply with the updated standard. Many of the changes stem from the recent high profile breaches, despite being compliant.
March 02, 2015 Added by:Anthony M. Freed
A new study conducted by the Ponemon Institute reveals how easy it is to undermine enterprise security with low-tech visual hacking operations, where nine out of every ten attempts (88%) were found to be successful.
February 26, 2015 Added by:Joe Weiss
I have felt that the insurance companies can be a major player in driving the need to adequately secure control systems.
February 26, 2015 Added by:Patrick Oliver Graf
Whatever you picture, the fact is that mobility is now a key expectation of many employees. Those who work from laptops, tablets and other mobile devices need to be certain that the technology they depend on is able to follow them from place to place, without any service interruption.
February 25, 2015 Added by:Cyphort
Cyphort Labs has collected and analyzed a highly advanced piece of malware, which for all intents and purposes seems to be a full blown cyber espionage tool of the kind a nation state would be behind.
February 25, 2015 Added by:Anthony M. Freed
The Federal Financial Institutions Examination Council (FFIEC) has issued revised Business Continuity Planning (BCP) guidelines for the financial services sector