A furor over bugs in password managers left users in a jam. Self-proclaimed security empress Jessy Irwin clears up the confusion. Read More ▶ | | | Video/Webcast: Intuit You cant fix what you can't measure. That's why achieving total visibility into your company's processes -- both on their own and all together -- is the key to business growth.Join Steven Bonacorsi, President at the International Standard for Lean Six Sigma (ISLSS), along with Adam Hoover and Sean MacPherson of QuickBase, for this exclusive on-demand webinar. Read More ▶ | A group within Western Union information security team relies on cloud software, including content management, social collaboration and single sign-on tools to let employees to get their work done while protecting corporate data. Read More ▶ | | Vendors serving the InfoSec market are quick to sling buzzwords and jargon, but do the terms used accurately reflect their product's abilities? Sometimes the marketing is correct, but most of the time the pitches are full of FUD and sensationalized with hype. Read More ▶ | | When an agency with security in its name chooses to exploit a security exposure rather than fix it, we have a problem, writes columnist Rob Enderle. Read More ▶ | | | White Paper: CA Technologies Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.1 PCI DSS v3 established various requirements for safeguarding an organization's relevant systems and networks, comprising the Cardholder Data Environment (CDE). Read More ▶ | Top 5 Stories | Editor's Picks | | | |
0 comments:
Post a Comment