Editors' Picks
-
It's time for a real accreditation process for cloud storage services
Columnist Kevin McDonald calls for a cloud storage accreditation process, one that overcomes shortcomings in vendor certifications and IT audits.25 Jul 2012
-
Using SSAE 16 standard, SOC reports to assess cloud provider security
The SAS 70 report has been replaced by the SSAE 16, but how does it stack up as a tool to measure a provider’s security?20 Feb 2012
-
Comparing certifications: ISO 27001 vs. SAS 70, SSAE 16
Compliance expert Charles Denyer covers ISO 27001 vs. SAS 70, and why enterprises should pay attention to SSAE 16 over SAS 70.06 Sep 2011
More Like This
-
SSAE 16
SSAE 16, also called Statement on Standards for Attestation Engagements 16, is a regulation created by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (...13 Apr 2012
-
FAQ: How does an SSAE 16 report provide compliance control guidance?
An SSAE 16 report is a common tool for service providers demonstrating risk controls. But does SSAE 16 actually provide proof of solid GRC processes?11 Jan 2013
-
Comparing certifications: ISO 27001 vs. SAS 70, SSAE 16
Compliance expert Charles Denyer covers ISO 27001 vs. SAS 70, and why enterprises should pay attention to SSAE 16 over SAS 70.06 Sep 2011
-
Using SSAE 16 standard, SOC reports to assess cloud provider security
The SAS 70 report has been replaced by the SSAE 16, but how does it stack up as a tool to measure a provider’s security?20 Feb 2012
-
MicroScope's top stories, week ending 16 August 2013
Microsoft names first Brit Surface partners, Azlan and Avaya reunite, and Cisco cuts 4,000 jobs as recovery remains sluggish. Catch up on the biggest channel news stories from the past seven days19 Aug 2013
-
Targeted cyber attacks cost up to £1.6m
Targeted cyber attacks could cost enterprises up to £1.6m, a survey has revealed25 Jul 2013
-
TPM security overview: Defining the benefits of TPM devices
The nearly ubiquitous TPM device is an often-overlooked tool in an infosec pro's arsenal. Expert Michael Cobb details the benefits of TPM security.19 Aug 2013
-
PCI DSS 3.0 preview highlights passwords, providers, payment data flow
The proposed PCI DSS 3.0 standard would emphasize in-house vulnerability assessments, add password flexibility and highlight provider compliance.15 Aug 2013
-
Apple shares hit 16-month low
Apple shares have hit a 16-month low due to concerns that the lower than expected phone and tablet sales may cause the company to miss its revenue targets.18 Apr 2013
-
Open source code management: How to safely use open source libraries
Expert Michael Cobb explains why enterprises need better open source code management to negate the security risks posed by open source libraries.13 Aug 2013
-
Neohapsis: IPv4 plus IPv6 enables man-in-the-middle attacks
Neohapsis' Scott Behrens explains how having both IPv4 and IPv6 Internet protocols enabled can lead to man-in-the-middle attacks.09 Aug 2013
-
Identifying and locking down known Java security vulnerabilities
Expert Michael Cobb discusses why known Java security vulnerabilities are on so many endpoints and how to contain them -- without updating Java.08 Aug 2013
-
Enterprise mobile security by the numbers
Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?01 Aug 2013
-
Government commits to future broadband spend in 2015-16
Government will continue to invest in broadband in 2015-16, says chancellor George Osborne26 Jun 2013
-
CASP certification: Does CompTIA's security certification offer value?
The new CompTIA Advanced Security Practitioner certification won't replace the CISSP, but it may offer critical value to one specific group.25 Jul 2013
-
Cyberthreat landscape plagued by automated attacks, Gartner says
Gartner VP Richard Hunter reviews the enterprise cyberthreat landscape and explains why automated attacks will only make a bad situation worse.24 Jul 2013
-
Users may remain vulnerable despite Oracle Java patch release
Oracle has issued a new security patch for Java, but only 7% deployed the patch before it.18 Jun 2013
Security Management Strategies for the CIO