Skip Links

Compliance Research Center

Your source for the latest news, opinion, product comparisons and reviews of compliance tools.

Compliance News
How a cyber cob patrols the underworld of e-commerce
Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97...
Here are the options with Heartbleed-flawed networking gear (Hint: there aren't many)
Companies faced with the threat posed by networking equipment that contains the notorious Heartbleed bug have few security options beyond working...
The Internet of Things: An exploding security minefield
Everybody from the Federal Trade Commission (FTC) to a unanimous crowd of security experts has been issuing increasingly insistent warnings that...
As companies grow, managing risks gets more complex
Size matters when it comes to security, according to Davi Ottenhelmer. Ottenhelmer, senior director of trust at EMC, titled his presentation at...
Hackers prepping for OpenSSL Heartbleed attacks
While security pros hustle to patch Web sites affected by the widespread OpenSSL flaw nicknamed Heartbleed, there are indications that cybercriminals...
How to defend against the OpenSSL Heartbleed flaw
CSOs need to take a number of steps as soon as possible to protect their organizations against the OpenSSL vulnerability that has shaken the tech...
Cognitive bias: The risk from everyone in your organization, including you
Risks to enterprises are not only of the security breach variety from outside attackers, malicious insiders or even careless employees. Another comes...
Symantec to CISOs: Watch for the 'mega-breach'
Symantec has declared 2013 the year of the "mega-breach," placing security pros on notice that they stand to lose big from phishing,...
How MDM works -- or doesn't work -- for SMBs
In large-scale organizations, implementing mobile device management (MDM) is typically given. After all, with so many employees using mobile devices...
Microsoft tightens restrictions on adware on Windows PCs
Starting July 1, developers of adware for Windows will have to contend with new Microsoft-imposed rules aimed at making it easier for people to stop...
Zeus malware found with valid digital certificate
A recently discovered variant of the Zeus banking Trojan was found to use a legitimate digital signature to avoid detection from Web browsers and...
Why you need to segment your network for security
Pen tester Mark Wolfgang argues segmenting for security is a key piece of an overall defense-in-depth strategy. Here he explains why and how to...
RSAC 2014: Experts discuss the harsh realities of Incident Response
How well is incident response working for corporations effected by security incidents? A panel at RSA says there is still a lot of work to be done
Cloud Service Providers Fight Back, Challenge NSA
Facing a real business threat from the fallout from the NSA's intelligence gathering, tech sector luminaries are expanding their presence in...
Mac users warned against using public Wi-Fi networks
Connecting to unsecured networks not advisable for Apple users until patch is released for vulnerability
Ransomware like Cryptolocker uses Bitcoin, other virtual currencies for payment
Attackers use malware to hold personal data hostage until victims shell out money to get it back. Here's how to prevent it from happening to you
How to securely get started using SDN
Though some might argue that it's inherently insecure, SDN has changed for the better in recent years, allowing it to be implemented securely
Inside knowledge likely in Target breach, experts say
How did what is likely to be one of the largest data breaches in history occur? Some speculate it was only possible with insider knowledge
The 8 hottest security stories of 2013
We recap the biggest security news from this past year
Why CIOs stick with cloud computing despite NSA snooping scandal
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled...