Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Enterprise Risk Management (ERM) is a topic of interest throughout an organization - and increasingly at the board of director level.
But how does a security leader engage the board on ERM - and keep it engaged?
Visa has announced new global best practices for data field encryption, also known as end-to-end encryption - a much-discussed solution in the wake of the Heartland Payment Systems breach.
Jobs in information security -- including architects, analysts and administrators with hot skills and competencies -- are among the IT opportunities offering the most employment security in the current economy.
This is the news from Foote Partners, LLC, a Florida-based research consultancy that focuses on IT...
The Gramm-Leach-Bliley Act (GLBA), also known as The Financial Modernization Act of 1999, was enacted to ensure protection over customer's records and information. Authorization to implement this act was given to The Federal Trade Commission (FTC) with an effective date for compliance set on May 23, 2003.
GLBA...
Log Management is a necessary first step, but only a baseline technology. Compliance mandates and good security practice also require real-time, end-to-end monitoring to identify, prioritize, analyze and remediate the true threats. Given the increase in targeted stealth attacks, clear visibility is more important than...
Log Management is a necessary first step, but only a baseline technology. Compliance mandates and good security practice also require real-time, end-to-end monitoring to identify, prioritize, analyze and remediate the true threats. Given the increase in targeted stealth attacks, clear visibility is more important than...
Hi. This is Tom Field, Editorial Director with Information Security Media Group. Welcome to today's session entitled Log Management: How to Better Safeguard Customer Data. Your presenters and sponsors today are Chris Peterson, Founder and CTO of LogRhythm, and John Earl, CTO and Vice President of PowerTech. ...
In the current economic and cultural environment, the financial services industry is being particularly scrutinized with regards to legal and regulatory compliance.
Learn more about the legal and regulatory compliance requirements targeting the Finance industry.
Download this white paper to:
Learn about...
For the second time in four months, the Commonwealth of Massachusetts has pushed back the implementation of its new data protection law - one of the toughest in the nation.
Yet even with the new deadline of January 2010, many of the businesses impacted by these stringent data protection requirements won't be...
What if you could immediately tap into the unused value that exists within your IT infrastructure?
This white paper explores how the power of an information availability solution can unlock the latent potential of your IT environment and deliver new value for your organization.
It includes an "Action Worksheet"...
This report includes the input of over 2,000 companies running AIX and IBM i (i5/OS) environments regarding their data protection, recovery and optimization technologies and strategies.
Learn how your peers are striking the balance between the often antagonistic priorities of optimum IT availability and...
Reported data breaches increased by nearly half in 2008, and 12 percent of the total hacks were at financial institutions - up from 7 percent in 2007.
This is the news from the Identity Theft Resource Center's (ITRC) 2008 breach report, which shows that 2008's 656 reported breaches were up 47 percent over 2007's...
With hundreds and thousands of automated systems producing log data, an organization's ability to respond to "abnormal" activities in a timely manner is dependent on the quality of its log management program and related processes.
Attend this webinar to hear industry experts discuss real-life scenarios and offer...
Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.