Yearly Archives: 2011

Security Expert Gunnar Peterson – “Don’t Hit the Snooze Button on DigiNotar Alarm Bells”

The DigiNotar breach is being called the worst breach so far (http://blogs.bankinfosecurity.com/posts.php?postID=1068). Breaches come in all shapes and sizes, but when they occur on the very systems that are supposed to protect us, the impact is more widespread. Certainly this … Read more >

Webinar: Federal Cloud Security Initiatives Explained – Choosing the Right Standards and Technologies

Join us on 10/6 at 2pm Eastern Time for an exciting and informative webinar: Federal Cloud Security Initiatives Explained – Choosing the Right Standards and Technologies Mapping the alphabet soup of federal cloud security initiatives is a daunting task. Tim … Read more >

Controls are still an issue for the PCI Tokenization Guidelines

The PCI Council today released the long-awaited tokenization guidelines (Information Supplement: PCI Tokenization Guidelines) which give merchants specific guidance on using tokenization to reduce PCI scope and assessment costs, which have been costing large merchants upwards of $500,000 / year. … Read more >

Radian Uses Intel Expressway Service Gateway to Power Data Transformation Security

Radian, a national provider of private mortgage insurance and risk management products is discussed in a new case study involving Intel Expressway Service Gateway.Radian looked to Intel to help build an architecture that utilized XML as a common format for … Read more >

Achieving unified control, visibility, and compliance for SaaS applications

Technical Information Security Policy The first step to delivering the right control and visibility architecture for SaaS is to formalize the enterprise’s goal in a Technical Security Policy. The security policy lifecycle begins with policy creation and development. The Security … Read more >