IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 
Definition continues below.
Information SecurityReports
126 - 150 of 391 Matches Previous Page  | Next Page
Enabling the secure use of RFID
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Dario Bevilacqua and Keith Mayes  describe the design of an UHF RFID system for secure identification and tracking.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

ComputerWeekly.com

Recordkeeping Needs Assessment Case Study: Using the Cloud to Improve Dismal Scores
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom explores the methodology used to conduct an early Generally Accepted Recordkeeping Principles® needs assessment (N.A.), followed by a discussion of how the N.A. led to the selection of a Cloud provider to improve dismal scores.
Posted: 02 Apr 2013 | Premiered: 02 Apr 2013


Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Information Governance University: Records Management Strategy, Transparency and Collaboration Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This session discusses expert strategies on simplifying records management
Posted: 06 Mar 2013 | Premiered: 07 Feb 2013

SearchCompliance.com

Information Governance Online Symposium
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Since corporate data is one of an organization's most valuable assets, it only makes sense to implement an information governance policy. By doing so, IT leaders can reduce legal risks and increase the ability to be more agile. Enter this online learning environment in order to gain information governance advice from several industry experts.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

SIEM IT Decision Center- Checklist #1
sponsored by SearchSecurity.com
EGUIDE: If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
Posted: 08 Feb 2013 | Published: 01 Jan 2013

SearchSecurity.com

ISM Essentials Guide – Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

SearchSecurity.com

The Compliance Case for Social Media Records Management
sponsored by Iron Mountain
EGUIDE: In this e-guide, learn how your organization can develop a solid records management policy to stay compliant while reaping social networking benefits.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

Iron Mountain

Information governance: Reduce risk and improve compliance
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

Iron Mountain

Information Governance: Business Imperative or Technology Asset?
sponsored by Iron Mountain
EBRIEF: In our expert research brief, discover why the experts believe the key to successful, effective information governance begins with communication and cooperation between IT and business leaders. Gain insight into key findings from our 2012 information governance survey of 233 IT, compliance and records management professionals.
Posted: 23 May 2012 | Published: 01 May 2012

Iron Mountain

Information Security Magazine - May 2012
sponsored by SearchSecurity.com
EZINE: Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.
Posted: 01 May 2012 | Published: 01 May 2012

SearchSecurity.com

April Essential Guide to Data Protection
sponsored by SearchSecurity.com
EGUIDE: In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
Posted: 10 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

Presentation Transcript: The Top 5 Pitfalls of Log Management and SIEM Deployments and How to Avoid Them
sponsored by eIQnetworks
PRESENTATION TRANSCRIPT: This valuable resource counts down the top 5 pitfalls of log management and security information and event management (SIEM) deployments and offers essential advice for avoiding these challenges and achieving SIEM success.
Posted: 15 Feb 2013 | Published: 04 Feb 2013

eIQnetworks

Taking the fear out of bringing Government Systems online
sponsored by IBM
WHITE PAPER: People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems.
Posted: 27 Dec 2012 | Published: 24 Jul 2012

IBM

BI Trends and Strategies E-Zine Issue 8
sponsored by SearchBusinessAnalytics
EGUIDE: Organizations are carving out small slices of their DWs and databases where scientists and analysts can manipulate and analyze data sets. The intent of the data sandbox is to separate experimentation from the production database environment. Read this edition of BI Trends and Strategies to learn about the many benefits of using data sandboxes.
Posted: 03 Aug 2012 | Published: 01 Aug 2012

SearchBusinessAnalytics

The path to securing your mobile Enterprise
sponsored by Juniper Networks, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript highlights the rise in mobile popularity, emerging security threats and how people are handling them. Discover more about IT architectures for mobile devices and how you can further develop a mobile workplace.
Posted: 12 Jul 2012 | Published: 12 Jul 2012

Juniper Networks, Inc.

Compliance Driven Security
sponsored by Dell, Inc.
WHITE PAPER: With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell, Inc.

Presentation Transcript: 3 Steps to Securing Private Data in the Public Cloud
sponsored by Sophos, Inc.
PRESENTATION TRANSCRIPT: Public cloud storage services enable users to easily share and store data, but they also introduce new security challenges that often clash with exiting IT policies. In this presentation transcript, learn how IT managers can help their users manage access to the public cloud without placing your data or business at risk.
Posted: 12 Jun 2012 | Published: 12 Jun 2012

Sophos, Inc.

Compliance strategies for greater cyber security policies
sponsored by HP Enterprise Security
EGUIDE: Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.
Posted: 05 Jun 2012 | Published: 01 Jun 2012

HP Enterprise Security

The Security for Business Innovation Council (SBIC) report, 'Getting Ahead of Advanced Threats'
sponsored by EMC Corporation
WHITE PAPER: In an era of advanced threats, having greater situational awareness is vital for detecting and mitigating attacks. Unfortunately, most organizations lack the capability for intelligence gathering and analysis. In this comprehensive report, gain guidance from top security leaders on how to get ahead with intelligence-driven information security.
Posted: 22 May 2012 | Published: 21 May 2012

EMC Corporation

How Can Content-Aware Identity and Access Management Give Me the Control I Need to Confidently Move My Business forward?
sponsored by CA Technologies.
WHITE PAPER: Organization's today have their hands full trying to adhere to regulatory requirements and reduce IT risks, all while looking for innovative ways to grow their business. This paper uncovers how to gain continuous and sustainable control and compliance though IAM, while strengthening the trust and satisfaction of your customers and partners.
Posted: 16 May 2012 | Published: 01 Feb 2012

CA Technologies.

Business Oriented Information Architecture
sponsored by Sybase, an SAP company
WHITE PAPER: This paper outlines an information architecture (IA) and why it is useful in determining everything from the robustness of IT projects to testing business process scenarios to see if they satisfy the wide-ranging needs of your business. Read this now to learn more about IA, including its basic design, how to start your program and more.
Posted: 17 Apr 2012 | Published: 16 Apr 2012

Sybase, an SAP company

Honey Stick Report Results
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

Symantec Corporation

Ovum: Corporate eGRC update
sponsored by RSA
WHITE PAPER: This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future.
Posted: 29 Mar 2012 | Published: 01 Dec 2010

RSA

The Evolution of Information Security Management: 4-Phased Maturity Model
sponsored by RSA
WHITE PAPER: Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA
126 - 150 of 391 Matches Previous Page    4 5 6 7 8 9    Next Page
 
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement