Editors' Picks
-
It's time for a real accreditation process for cloud storage services
Columnist Kevin McDonald calls for a cloud storage accreditation process, one that overcomes shortcomings in vendor certifications and IT audits.25 Jul 2012
-
Using SSAE 16 standard, SOC reports to assess cloud provider security
The SAS 70 report has been replaced by the SSAE 16, but how does it stack up as a tool to measure a provider’s security?20 Feb 2012
-
Comparing certifications: ISO 27001 vs. SAS 70, SSAE 16
Compliance expert Charles Denyer covers ISO 27001 vs. SAS 70, and why enterprises should pay attention to SSAE 16 over SAS 70.06 Sep 2011
More Like This
-
SSAE 16
SSAE 16, also called Statement on Standards for Attestation Engagements 16, is a regulation created by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (...13 Apr 2012
-
FAQ: How does an SSAE 16 report provide compliance control guidance?
An SSAE 16 report is a common tool for service providers demonstrating risk controls. But does SSAE 16 actually provide proof of solid GRC processes?11 Jan 2013
-
Comparing certifications: ISO 27001 vs. SAS 70, SSAE 16
Compliance expert Charles Denyer covers ISO 27001 vs. SAS 70, and why enterprises should pay attention to SSAE 16 over SAS 70.06 Sep 2011
-
Using SSAE 16 standard, SOC reports to assess cloud provider security
The SAS 70 report has been replaced by the SSAE 16, but how does it stack up as a tool to measure a provider’s security?20 Feb 2012
-
Targeted cyber attacks cost up to £1.6m
Targeted cyber attacks could cost enterprises up to £1.6m, a survey has revealed25 Jul 2013
-
Neohapsis: IPv4 plus IPv6 enables man-in-the-middle attacks
Neohapsis' Scott Behrens explains how having both IPv4 and IPv6 Internet protocols enabled can lead to man-in-the-middle attacks.09 Aug 2013
-
Identifying and locking down known Java security vulnerabilities
Expert Michael Cobb discusses why known Java security vulnerabilities are on so many endpoints and how to contain them -- without updating Java.08 Aug 2013
-
Apple shares hit 16-month low
Apple shares have hit a 16-month low due to concerns that the lower than expected phone and tablet sales may cause the company to miss its revenue targets.18 Apr 2013
-
Enterprise mobile security by the numbers
Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?01 Aug 2013
-
Government commits to future broadband spend in 2015-16
Government will continue to invest in broadband in 2015-16, says chancellor George Osborne26 Jun 2013
-
CASP certification: Does CompTIA's security certification offer value?
The new CompTIA Advanced Security Practitioner certification won't replace the CISSP, but it may offer critical value to one specific group.25 Jul 2013
-
Cyberthreat landscape plagued by automated attacks, Gartner says
Gartner VP Richard Hunter reviews the enterprise cyberthreat landscape and explains why automated attacks will only make a bad situation worse.24 Jul 2013
-
Users may remain vulnerable despite Oracle Java patch release
Oracle has issued a new security patch for Java, but only 7% deployed the patch before it.18 Jun 2013
-
Big data analytics: New patterns emerge for security
Will big data analytics make security better? With data scientists in short supply, solution providers rush to provide big data analytics tools.03 Jun 2013
-
16th annual IT Law Summer School
Date: 5-9th August, 2013
Location: Downing College, Cambridge
18 Jan 2013 -
Five common Web application vulnerabilities and how to avoid them
Expert Michael Cobb details the five most common Web application vulnerabilities and provides methods to help enterprises to secure them.14 May 2013
-
The evolution of threat detection and management
Enterprises must understand the latest threat detection options to keep up with advanced cybercriminals who can bypass enterprise security defenses.05 May 2013
Security Management Strategies for the CIO