Compliance

201d6e4b7cd0350a1a9ef6e856e28341

How serious is the Aurora vulnerability for nuclear plants?

February 04, 2014 Added by:Joe Weiss

This risk is certainly more probable than once in a million years which is the minimum criteria for the safety analysis to address specific threats.

Comments  (0)

6d117b57d55f63febe392e40a478011f

U.S. Intelligence Agencies Say Healthcare.gov May be Compromised

February 04, 2014 Added by:Anthony M. Freed

U.S. intelligence agencies warned the Department of Health and Human Services that the Healthcare.gov may have been compromised by contractors from Belarus who worked on developing code for the network who are suspected of inserting malicious code.

Comments  (1)

C787d4daae33f0e155e00c614f07b0ee

The Perils of Combining Security and Compliance

January 27, 2014 Added by:Robb Reck

There is a natural tendency to lump security and compliance together. Intuitively it just makes sense right? The biggest compliance frameworks like PCI, GLBA, SOX and HIPAA are all looking to ensure that our security is up to snuff. In fact, if we do security right, compliance should come naturally, with very little additional technical work.

Comments  (0)

6d117b57d55f63febe392e40a478011f

House Subcommittee Passes Legislation to Protect Critical Infrastructure

January 21, 2014 Added by:Anthony M. Freed

The House of Representatives Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies has passed a bill to bolster provisions to protect the nation’s critical infrastructure, moving it one step closure to full consideration.

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Lessons from a Soccer Manager for the Compliance Practitioner

January 21, 2014 Added by:Thomas Fox

Compliance leadership can take many forms and inspiration can come from many different sources.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Why The Paradigm Must Change

January 21, 2014 Added by:PCI Guru

The Target, Neiman Marcus and the potential other breaches of retailers to come should be a learning moment for all of us to demand that the card brands change their business paradigm to one that is more secure.

Comments  (0)

C9f10ffa24531c96d85e0445499fd1e4

Target and Neiman Marcus Breaches Renew Issues Regarding PCI Lawsuits

January 16, 2014 Added by:john melvin

We have no way of knowing right now what the causes of the recent Target and Neiman-Marcus data breaches are. It just raises the same questions of: does compliance with PCI standards mean that everything is secure against attacks? If an application is compliant, is that enough? It doesn’t seem to be clear whether or not a company can completely “pass the buck” to the developers and maintaine...

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

The NIST Cyber Security Framework Completely Misses the Mark

January 06, 2014 Added by:Rohit Sethi

The NIST Cyber Security Framework completely lacks any mention of application security. We predict that organizations will likewise adopt the framework with scant attention paid to secure software, which will lull them into a false sense of security.

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (0)

C7159a557369b66632c4b54bf746b69e

It’s Here: PCI DSS 3.0

November 08, 2013 Added by:Sean Inman

Today the PCI Security Standards Council (PCI SSC) released version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS). Press Release

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

The Road To Identity Relationship Management

November 04, 2013 Added by:Simon Moffatt

The modern enterprise workforce, will contain contractors, freelancer and even consumers themselves. Bloggers, reviewers, supporters, promoters, content sharers and affiliates, whilst not on the company payroll, help drive revenue through messaging and interaction. If a platform exists where their identity can be harnessed, a new more agile go to market approach can be developed.

Comments  (0)

3071bd3c5c013c8c3defcccad0259c16

Encrypting Data At Rest Or In The Cloud: Is It Value Adding?

October 16, 2013 Added by:Hani Banayoti

Consider encryption at rest but make informed decisions about its value and protection afforded.

Comments  (2)

0356a83ecb15c8e33b00560d7bebe47f

What to Expect When You're NOT Expecting: 7 Steps of a Professional Forensic Investigator

October 02, 2013 Added by:Stephen Marchewitz

A brief understanding of the process, time and overall cost of a Card Holder Data. All information contained in this article is for the purposes of awareness and education. If you have experienced a breach, contact a PFI company immediately.

Comments  (0)

Ae27d21943468124221937d59167fff8

The Ethics of Monitoring Your Employees

September 03, 2013 Added by:Edwin Covert

As the GAO report makes clear, organizations are well within their legal rights to monitor employee activity online when using organization information technology resources.

Comments  (1)

219bfe49c4e7e1a3760f307bfecb9954

What PCI Requirements Apply to Us: Tacking a Common PCI DSS Compliance Challenge

August 21, 2013 Added by:Rohit Sethi

Determining which system components fall under PCI compliance can often be problematic for many companies. When it comes to PCI DSS (Payment Card Industry Data Security Standards) compliance assessments, scoping tends to become a major challenge.

Comments  (3)

4c8a80b80e239c2dd6cd6f8760e10e5f

Protecting the Enterprise Against Growing Social Threats

July 29, 2013 Added by:Vince Schiavone

Corporations looking to proactively protect the business against growing enterprise social risks are engaging advanced, strategic solutions to unveil and track a wide array of social threats. This delivers strategic intelligence for proactive response to effectively mitigate these threats, often before they explode into all out crises.

Comments  (4)

Page « < 2 - 3 - 4 - 5 - 6 > »