regulatory compliance - News, Features, and Slideshows

News

  • Vulnerability analysis tools add compliance features

    Compliance is a natural extension of a vulnerability analysis tool. Normal vulnerability scanning includes searching for unpatched systems, unprotected directories and other errors in configuration.

    Written by Joel Snyder20 June 11 14:56
  • Cloud Computing in 2011: 3 Trends Changing Business Adoption

    The business benefits of a cloud computing model have been well stated. You cut costs by switching to more flexible on-demand IT resources that can better handle the ebb and flow technology needs at a company.

    Written by Shane O'Neill10 Feb. 11 05:15
  • Cisco acquires Pari: What goes around, comes around

    Cisco this week announced its intent to acquire privately-held Pari Networks, a provider of network configuration, change and compliance management appliances that was <a href="http://www.networkworld.com/news/2008/013108-network-management-start-up.html">founded by former Cisco engineers</a>.

    Written by Jim Duffy27 Jan. 11 04:28
  • SAP gets deeper into XBRL with software acquisition

    SAP said Thursday it is acquiring software for handling XBRL (extensible business reporting language) requirements from German vendor Cundus. Terms of the deal, which is expected to be completed this year, were not disclosed.

    Written by Chris Kanaracus17 Dec. 10 06:53
  • Encryption adoption driven by PCI, fear of cyberattacks

    A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI) data security standards.

    Written by Ellen Messmer17 Nov. 10 03:19
  • Upgraded retail security standard ignores mobile payments

    The second version of the Payment Card Industry (PCI) Data Security Standard (DSS) is being released this afternoon by the organization PCI Security Standards Council, which sets the network and security requirements for merchants and service providers handling sensitive cardholder data.

    Written by Ellen Messmer29 Oct. 10 02:21
  • SecTor 2010: Why security is the enemy of privacy

    As we noted in last year's CSO article, "Six ways we gave up our privacy," people are increasingly -- and willingly -- throwing their privacy to the wind, thanks to an addiction to Google apps, GPS devices, the BlackBerry, iPhone and Android, and social networking sites like Facebook and Twitter. Some security experts believe privacy is dead already.

    Written by Bill Brenner27 Oct. 10 03:28
  • Meeting the new PCI wireless requirements

    Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless threats.

    Written by Ajay Kumar Gupta25 Sept. 10 03:34
  • FTC weighs letting consumers opt out of behavioral marketing

    As the grid of smart products grows more crowded with cars, appliances and even clothing carrying sensors, Web access and other technology for transmitting data between consumers and companies, the Federal Trade Commission is considering "do not track" policies.

    Written by Kim S. Nash25 Sept. 10 07:14
  • 10 steps to easier access management

    NEW YORK -- A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week.

    Written by Tim Greene15 Sept. 10 01:36
  • Do security regulations hinder business?

    Government needs to better understand the realities of running profitable businesses -- and quickly -- as it imposes security regulations that can affect the profitability of corporations battling in a competitive environment.

    Written by Tim Greene14 Sept. 10 04:41
[]