IT Compliance

Back to homepage

Inadequate Data Sanitization Puts Enterprises at Risk of Breaches & Compliance Failures

Global enterprises’ overconfidence and inadequate data sanitization are exposing organizations to the risk of data breach, at a time when proper data management should be at the forefront of everything they

Driving Collaboration Between Security & IT Ops Teams is a Major Challenge

Strained relationships between security and IT ops teams leave businesses vulnerable to disruption, even with increased spending on IT security and management tools, a Tanium research reveals. Click here to

Do Third-Party Users Follow Security Best Practices and Policies?

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security risks, One Identity reveals. Click here to view original

To Improve Incident Response, You Need to Consider 3rd Party Solutions

Organizations reported an average 32% reduction in threat responder workload when they deployed a managed SIEM solution, according to CenturyLink and IDG. Click here to view original webpage at www.helpnetsecurity.com

Executives are not Actively Engaged in Ensuring the Effectiveness of Cybersecurity Strategy

There’s a clear lack of accountability, especially on the board and among C-suite executives, and a lack of confidence in determining the efficacy of security technologies. Click here to view

Key Challenges Impacting IT Audit Pros Navigating An Evolving Risk Landscape

Protiviti and ISACA surveyed 2,252 chief audit executives (CAEs), internal audit professionals and IT audit vice presidents and directors worldwide. Click here to view original webpage at www.helpnetsecurity.com

Lack of IT Security Training Leaving Businesses Open to Data Breaches

When it comes to the workforce – everyone needs a little extra IT education, even those working in IT departments. This is according to a new report by Claranet, which

Mozilla Hardens Firefox Against Injection Attacks

The first codebase change impacts the built-in about:pages that Firefox ships with, and which were designed to provide an interface to the internal state of the browser. about:config is the best known of them,

Click2Mail Informs Users of Data Breach

Click2Mail allows customers to create, personalize, and proof mailpieces, as well as to acquire, build, and manage mailing lists. With the help of Click2Mail’s web browser-based tools, users do not

Most Expect the Risk of Privileged User Abuse to Increase

Insufficient privileged access management (PAM) practices continue to be a critical challenge for many organizations despite significant risks of data breaches and security incidents, according to Sila and Ponemon Institute. Click here to