Compliance and Cloud Security eBook
sponsored by TechTarget Security
EBOOK:
SearchSecurity.com presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing.
Posted: 19 Jul 2011 | Published: 19 Jul 2011
|
|
|
5 Mistakes Auditing Virtual Environments (You Don't Want to Make)
sponsored by HyTrust
WHITE PAPER:
Read this expert guide to ensure your virtual environment is in compliance with PCI DSS 2.0 and avoid common errors made in the auditing process.
Posted: 21 Jul 2011 | Published: 21 Jul 2011
|
|
|
HP TippingPoint Virtual Controller and Virtual Management Center
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Is management of a virtualized environment a major concern? The HP TippingPoint Secure Virtualization Framework is designed to provide IT personnel a single consolidated, yet flexible solution for extending the HP TippingPoint IPS Series with its excellent threat protection into the virtualized data center.
Posted: 06 Jul 2011 | Published: 06 Jul 2011
|
|
|
Enabling Continuous Compliance Across the Enterprise
sponsored by IBM
WHITE PAPER:
Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.
Posted: 01 Jul 2011 | Published: 30 Jun 2011
|
|
|
Information governance strategy: Developing a roadmap and structure for improving corporate information management
sponsored by RSD
EBOOK:
Access this eBook for practical advice on developing an information governance strategy, including a checklist of what to do – and what not to do – as part of a successful information governance initiative.
Posted: 02 Jun 2011 | Published: 02 Jun 2011
|
|
|
Information Security Ezine- Europe
sponsored by TechTarget ComputerWeekly.com
EZINE:
This e-zine presented by SearchSecurity.co.UK will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.
Posted: 02 Jun 2011 | Published: 02 Jun 2011
|
|
|
The State of Data Security
sponsored by Sophos
WHITE PAPER:
Recognize how your data can become vulnerable and understand the compliance issues involved. This paper identifies data protection strategies you can use to keep your organization's information both safe and compliant.
Posted: 26 May 2011 | Published: 26 May 2011
|
|
|
VMware vShield: Secure your Cloud with Virtualization-aware Security
sponsored by VMware, Inc.
VIDEO:
Organizations today are leveraging cloud computing to take advantage of increased agility and flexibility at a reduced cost. Yet, many are making the mistake of using physical security approaches to protect virtualized infrastructures and cloud environments. Find out how you can strengthen your application and data security in the cloud.
Posted: 20 May 2011 | Premiered: 20 May 2011
|
|
|
The evolving roles of IT Managers and CIOs. Findings from the 2010 Global IT Risk Study
sponsored by IBM
WHITE PAPER:
This overview of the 2010 IBM Global IT Risk Study uncovers the challenges associated with IT risk, and the steps IT managers and CIOs are taking to better understand, confront and resolve this concern.
Posted: 19 May 2011 | Published: 19 May 2011
|
|
|
Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE:
The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011
|
|
|
Best Practices for Managing the Increasing Depth of Compliance Regulation
sponsored by IBM
EGUIDE:
According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations. Learn what actions your organization can take to ensure compliance with evolving regulations.
Posted: 18 May 2011 | Published: 18 May 2011
|
|
|
Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance
sponsored by Oracle Corporation
WHITE PAPER:
When organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities.
Posted: 11 May 2011 | Published: 11 May 2011
|
|
|
Technical Requirements for Mobile Health Care Deployments
sponsored by Juniper Networks, Inc.
EGUIDE:
With the rapid adoption of mobile devices, it’s only natural that these devices have made their way into health care facilities. However, it’s crucial that mobile devices are protected from security vulnerabilities to ensure compliance with federal regulations. This e-guide discusses best practices for mobile health care deployments.
Posted: 09 May 2011 | Published: 09 May 2011
|
|
|
May Issue of Information Security Magazine: Data Protection: Going the Distance
sponsored by Information Security Magazine
EZINE:
This month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time.
Posted: 05 May 2011 | Published: 05 May 2011
|
|
|
IDS vs. IPS
sponsored by Sourcefire
EGUIDE:
When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.
Posted: 29 Apr 2011 | Published: 29 Apr 2011
|
|
|
How Will the Transition to ICD-10 codes affect Health IT?
sponsored by Virtusa Corporation
EGUIDE:
As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion.
Posted: 31 Mar 2011 | Published: 29 Mar 2011
|
|
|
E-Guide: GARP and How it Helps you Achieve Better Information Governance
sponsored by IBM
EGUIDE:
This e-guide answers the most frequently asked questions about information governance and GARP. Continue reading to get a firm introduction to GARP and information governance as a whole.
Posted: 22 Mar 2011 | Published: 22 Mar 2011
|
|
|
E-Guide: Risk Management and Compliance Enforcement for the Financial Industry
sponsored by IBM
EGUIDE:
This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.
Posted: 22 Mar 2011 | Published: 22 Mar 2011
|
|
|
Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company
sponsored by IBM
CASE STUDY:
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today.
Posted: 17 Mar 2011 | Published: 17 Mar 2011
|
|
|
End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST:
In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011
|
|
|
When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption
sponsored by WatchGuard Technologies, Inc.
TECHNICAL ARTICLE:
WatchGuard XCS SecureMail Email Encryption (XCS SecureMail) technology, powered by Voltage, provides easy-to-use, business-class encryption to enable organizations to securely transmit and receive private and sensitive data.
Posted: 24 Feb 2011 | Published: 24 Feb 2011
|
|
|
Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
sponsored by Silver Tail Systems
EGUIDE:
This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
Posted: 22 Feb 2011 | Published: 22 Feb 2011
|
|
|
Encouraging SharePoint Collaboration
sponsored by AvePoint, Inc.
WHITE PAPER:
This paper discusses how Microsoft SharePoint is the platform of choice for organizations to store enterprise-wide content. New features in SharePoint Server 2010 take the platform to the next level by improving the platform’s scalability and usability to further enhance collaboration among knowledge workers.
Posted: 21 Feb 2011 | Published: 21 Feb 2011
|
|
|
Tripwire Log Center
sponsored by Tripwire, Inc.
WHITE PAPER:
A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were considered more of a nuisance than a help. There were too many of them, they weren’t easily collected, and there was no easy way to make sense of which were important.
Posted: 08 Feb 2011 | Published: 08 Feb 2011
|
|
|
Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation
sponsored by Tripwire, Inc.
WHITE PAPER:
This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.
Posted: 08 Feb 2011 | Published: 07 Feb 2011
|
|