TechWeb Digital library
4 followers 0 articles/week
PCI DSS Cloud Compliance Cheat Sheet

Learn the Payment Card Industry Data Security Standard (PCI DSS) requirements, penalties, and how you can ensure your cloud programs meet compliance requirements. Steps for securing card data in the cloud include: <ul><li style="margin-left: 40px;">Audit where card data is being stored and transmitted</li><li style="margin-left:...

Wed May 6, 2015 00:53
Definitive Guide to Cloud Security

The cloud is transforming business for the better. However, given the seemingly endless supply of headlines on data breaches, it's not surprising that data security is now a board-level concern for 61% of organizations. Whether you're just starting to define cloud security processes and policies, or you're reviewing an existing framework, we've put...

Wed May 6, 2015 00:53
Cloud Adoption and Risk Report

Based on anonymized usage data from over 17 million users, this Cloud Adoption and Risk Report provides an analysis of the current cloud landscape and security risks posed by sharing data with partners in the cloud. In this report, we focus on partner connections like the one hackers exploited in the $148 million Target breach. Download this report...

Wed May 6, 2015 00:53
7 Compliance-Killing Cloud DLP Mistakes

Leverage the substantial time, money, and resources invested in your on premise DLP solutions. This cheat sheet offers critical considerations for applying your DLP policies to cloud services.

Wed May 6, 2015 00:53
10 Ways Everyone Should Approach Cybersecurity in 2015

Many security breaches over the last year have taught us new lessons (or clarified ones we should have already learned). This paper reviews these key issues and focuses attention on ten responses we all need to adopt in our approach to security in 2015.

Fri May 1, 2015 19:24
The DomainTools Report: A Profile of Malicious Domains 2015

Much of the malicious activity on the Internet is classified and tracked in domain blacklists and reputation scores. But these do little to profile and predict cybercrime to proactively protect against domains that have yet to exhibit illicit behavior. Malicious actors behave in a predictable manner, and the more thoroughly we profile that behavior,...

Fri May 1, 2015 17:22

Build your own newsfeed

Ready to give it a go?
Start a 14-day trial, no credit card required.

Create account