compliance - News, Features, and Slideshows

News

  • Microsoft joins RegTech Association

    The industry body for the burgeoning regulation technology sector – the RegTech Association (RTA) – has announced the addition of Microsoft to its membership ranks.

  • PCI DSS compliance improving says Verizon

    Over 60 per cent of companies assessed by Verizon were compliant with one or more Payment Card Industry Data Security Standards (PCI DSS) requirements in 2014 according to the vendor’s latest report.

  • Viewpoint: When it comes to enterprise security, is it better to focus on compliance or risk?

    A CIO once quipped, "Security isn't hard, compliance is." And in fact many companies focus their security efforts on meeting compliance requirements. But if you are audit compliant, have you in fact addressed all of your risks, or are you just kidding yourself? Is it better to focus on the risks presuming that doing so will cover you off on the compliance side? Network World Editor in Chief put the question to two practitioners, both of whom come down on the side of risk.

  • SSH key mismanagement and how to solve it

    In 1995, when I was a university student in Helsinki, I developed a security protocol to protect data-in-transit as it moved throughout our network. I named it the "secure shell," or SSH for short. Today, SSH is used by organizations of all types and sizes as a secure method to move data from machine to machine and provide remote administrator access. From the perspective of an attacker or malicious insider, SSH is an artery that carries vital organizational data.

  • Many global organizations flub electronic-records requests

    More companies are tackling how to best set up their electronic records to be able to respond to any legal requests related to "electronic discovery" to quickly find internal documents for court purposes, but this "e-discovery" process is still a struggle, a survey published today indicates.

  • 10 tips on how to win the IT asset management challenge

    Companies have a lot to gain by maintaining control of IT assets. They can avoid massive unplanned expenses, increase productivity and provide easy access to information for decision making. When designing an IT asset management (ITAM) program, keep these tips in mind.

  • Building a fortress in the cloud for your critical data

    Businesses are in the crosshairs as military and spy organizations around the world step up their cyber-snooping techniques, and the shift to cloud is only exacerbating the risks. How can you be sure your cloud partner is capable of protecting your data from cyberattacks?

  • Start up offers Saas app to manage data-breach incidents

    If your company suffered a data breach, would you know what to do to comply with state, federal and local law? Start-up Co3 Systems is offering a software-as-a-service (SaaS) application to tackle that unhappy task, tracking how a corporate data-loss incident is handled.