SOX Compliance: A Comprehensive Overview

SOX Compliance: A Comprehensive Overview

It has been more than 10 years since the initial passage of the Sarbanes–Oxley Act of 2002 and, even today, many organizations still struggle to fulfill their auditing and compliance requirements. If not done smartly, meeting your obligations as a publically traded company can be expensive, time-consuming and ultimately counterproductive for your business goals. It doesn’t have to be that way. The more you know ahead of planning for an audit, the more seamless and effective the process will be. In this article, we attempt to answer the question, “What is SOX compliance,” in the most straightforward, accessible and pragmatic

How to Overcome Security Issues in Cloud Computing

Cloud Security vs. Traditional SecurityThere’s a strain of conservatism among certain IT professionals — the enthusiasm for all things new and innovative is tempered by skepticism about security challenges and other issues. Part of this is simply the nature of our industry. After all, it’s our job to anticipate risks and develop creative ways to mitigate them. However, this type of caution also leads to the kind of broad thinking and blanket statements that ultimately do little to address individual security challenges on an organizational level. Broad skepticism is particularly prominent when comparing cloud security vs. traditional networks. Many IT professionals view cloud security

On-Demand Passwords Vs. Two Factor Authentication

Two factor authentication has long been considered one of the best ways to prevent fraud and protect sensitive information against intrusion. In March 2015, however, Yahoo generated a lot of press with the introduction of its on-demand password system, supposedly a more convenient, easier-to-use alternative to two factor authentication that nevertheless provides a high level of protection against threats.

Will Yahoo’s competitors start to adopt similar security on-demand intrusion protection, or will the technology fail to build on its initial promise? Let’s look beyond the hype and take a critical look at the relative merits of on-demand passwords and two

The Clinton Email Scandal: A Wakeup Call for Network Security Professionals

Pollsters and journalists alike have been describing Hillary Clinton’s path to the Democratic nomination for president in 2016 to be inevitable, but that doesn’t mean there haven’t been some bumps along the road. To date, the most significant roadblock has been the recent revelations that Clinton used a private email account and server to send and receive messages while she was Secretary of State between 2009 and 2013.

While only time will tell whether or not the scandal has an impact on Clinton’s quest to become the first female president of the United States, it highlights many of the concerns

Preventing Credit Card Hacks Through Integrity Monitoring

Recent high-profile hacks against Target, Home Depot and other major retailers have drawn attention to the vulnerability of credit card data both online and off. In the wake of this, several methods have been suggested for reducing the likelihood of future attacks. There’s no question that greater consumer awareness, as well as the adoption of smart card technology, will play a role in keeping credit card data secure in the future. But what can be done to prevent security breaches at the infrastructural level?