Standards  >  

Information Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Standards Reports
 
Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Corporation
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Why Attack Intelligence Matters
sponsored by Core Security Technologies
WHITE PAPER: Continue on to this informative white paper to learn how attack intelligence can analyze your vulnerability data, security events, and configuration data to give you a concise view of the attack paths to your most critical data.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

X-Force Mid-Year Trend Report
sponsored by IBM
ANALYST REPORT: This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Posted: 11 Jan 2012 | Published: 11 Jan 2012

IBM

Computer Weekly - 3 April 2012: Data security best practice
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.
Posted: 02 Apr 2012 | Published: 03 Apr 2012

ComputerWeekly.com

PCI 101: A Beginner’s Guide to PCI DSS Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast covers everything you need to know about the payment card industry data security standard.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
WHITE PAPER: In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Lumension

Non-compliance outweighs the cost of compliance
sponsored by IBM
EGUIDE: Even though compliance has proven to be more of a chore for companies than a pleasant task, the facts show that when companies put the effort into complying, savings occur. Read this expert tip guide and discover why the cost of non-compliance is more than maintaining it.
Posted: 06 Dec 2011 | Published: 06 Dec 2011

IBM

Compliance strategies for greater cyber security policies
sponsored by HP Enterprise Security
EGUIDE: Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.
Posted: 05 Jun 2012 | Published: 01 Jun 2012

HP Enterprise Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement