Quantcast
Channel: Compliance & Regulations
Browsing latest articles
Browse All 389 View Live

Image may be NSFW.
Clik here to view.

Are PCAST recommendations feasible for remaking government IT?

The most recent report from the President’s Council of Advisors on Security and Technology identified a broad range of vulnerabilities in public sector IT. The council cited government agencies for...

View Article



Image may be NSFW.
Clik here to view.

Mobile banking apps must be made more secure

How secure are mobile banking apps? Many individuals and organizations already trust smartphones to perform critical tasks such as reading email, working with corporate documents and conducting...

View Article

Image may be NSFW.
Clik here to view.

Insider misuse and error are increasingly the cause of data breaches

Data breaches have many causes, from outdated security software to employee mistakes. While enterprises have to contend with a wide array of external dangers – for example, record-setting distributed...

View Article

Image may be NSFW.
Clik here to view.

Encryption needs to be a bigger part of cloud security

Many organizations are gradually setting aside their reservations about cloud security and storing more company data to the cloud. This move may confer numerous benefits to them, including reduced...

View Article

Image may be NSFW.
Clik here to view.

The Internet is becoming more encrypted, but vulnerabilities remain

Encryption has always been a central concern for the cybersecurity community, but it has taken on added importance following the 2013 revelations of widespread Internet surveillance by world...

View Article


Image may be NSFW.
Clik here to view.

What to consider when improving BYOD security

By now, BYOD is nothing new for the majority of businesses. Mobile technology, for the most part, has been integrated into company processes in a range of individual organizations in every industrial...

View Article

Image may be NSFW.
Clik here to view.

Dealing with miscommunciation to mitigate insider threats

Although data breaches, insider threats and advanced persistent threats remain key risks for enterprises, on the technical side these organizations do not seem to lack viable solutions. Spending on...

View Article

Image may be NSFW.
Clik here to view.

US government increases attention on cyber security

As 2014 comes to a close and government business winds down for the year, one thing was made very clear: Cyber security is going to play a major role in 2015. First, President Obama nominated a major...

View Article


Image may be NSFW.
Clik here to view.

The risks of end-of-life software

Aging software can be surprisingly hard to put out to digital pasture. Microsoft Windows XP and Windows Server 2003 are both famous (or perhaps infamous) for how long they have remained in widespread...

View Article


Image may be NSFW.
Clik here to view.

Cyber security: The cooperation game

Competition is perhaps the most important component of the business sphere. After all, it's through brand and company competition that the best products end up hitting the marketplace. If Business 1 is...

View Article
Browsing latest articles
Browse All 389 View Live




Latest Images