IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 
Definition continues below.
Information SecurityReports
151 - 175 of 398 Matches Previous Page  | Next Page
Information Security Magazine - May 2012
sponsored by SearchSecurity.com
EZINE: Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.
Posted: 01 May 2012 | Published: 01 May 2012

SearchSecurity.com

April Essential Guide to Data Protection
sponsored by SearchSecurity.com
EGUIDE: In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
Posted: 10 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

Maximize the business value of your information
sponsored by Iron Mountain
WHITE PAPER: Your company's information is the most valuable asset you have, so protecting it and getting the most business value possible from it is vital to your enterprise's success. Read this white paper to learn how to maximize the value of your physical and digital data to reduce costs, improve efficiency, and reduce risk.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

Iron Mountain

E-Guide: Identifying and addressing evolving threats
sponsored by SearchSecurity.com
EGUIDE: This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.
Posted: 03 Feb 2012 | Published: 03 Feb 2012

SearchSecurity.com

10 Ways Desktop Virtualization can Boost Security Capabilities
sponsored by Citrix
WHITE PAPER: Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology.
Posted: 10 Jan 2012 | Published: 18 Jun 2013

Citrix

E-Guide: Steps to securing your file transfers and meeting compliance requirements
sponsored by SearchSecurity.com
EGUIDE: Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.
Posted: 09 Jan 2012 | Published: 09 Jan 2012

SearchSecurity.com

How to create an effective data protection strategy for IT compliance
sponsored by SearchSecurity.com
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

SearchSecurity.com

The various ways to fight new and emerging cybercrime
sponsored by SearchSecurity.com
EGUIDE: Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

SearchSecurity.com

An effective mobile device security policy
sponsored by SearchSecurity.com
EGUIDE: Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

SearchSecurity.com

The Security for Business Innovation Council (SBIC) report, 'Getting Ahead of Advanced Threats'
sponsored by EMC Corporation
WHITE PAPER: In an era of advanced threats, having greater situational awareness is vital for detecting and mitigating attacks. Unfortunately, most organizations lack the capability for intelligence gathering and analysis. In this comprehensive report, gain guidance from top security leaders on how to get ahead with intelligence-driven information security.
Posted: 22 May 2012 | Published: 21 May 2012

EMC Corporation

How Can Content-Aware Identity and Access Management Give Me the Control I Need to Confidently Move My Business forward?
sponsored by CA Technologies.
WHITE PAPER: Organization's today have their hands full trying to adhere to regulatory requirements and reduce IT risks, all while looking for innovative ways to grow their business. This paper uncovers how to gain continuous and sustainable control and compliance though IAM, while strengthening the trust and satisfaction of your customers and partners.
Posted: 16 May 2012 | Published: 01 Feb 2012

CA Technologies.

Business Oriented Information Architecture
sponsored by Sybase, an SAP company
WHITE PAPER: This paper outlines an information architecture (IA) and why it is useful in determining everything from the robustness of IT projects to testing business process scenarios to see if they satisfy the wide-ranging needs of your business. Read this now to learn more about IA, including its basic design, how to start your program and more.
Posted: 17 Apr 2012 | Published: 16 Apr 2012

Sybase, an SAP company

Honey Stick Report Results
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

Symantec Corporation

Ovum: Corporate eGRC update
sponsored by RSA
WHITE PAPER: This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future.
Posted: 29 Mar 2012 | Published: 01 Dec 2010

RSA

The Evolution of Information Security Management: 4-Phased Maturity Model
sponsored by RSA
WHITE PAPER: Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA

UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk
sponsored by RSA
CASE STUDY: Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA

Getting Ahead of Advanced Threats - Achieving Intelligence-Driven Security
sponsored by RSA
WHITE PAPER: With today’s advancing threat landscape, traditional approaches to information security are no longer enough. Instead organizations need to take an intelligence-driven approach to more effectively detect and mitigate cyber attacks. View now to explore the growing need for intelligence-driven security and uncover a 6-step approach for achieving it.
Posted: 07 Mar 2012 | Published: 07 Mar 2012

RSA

Storage Data Protection Strategies In Today’s Data Center
sponsored by Oracle Corporation
WHITE PAPER: An increasing number of organizations are looking at how choosing the right storage platforms contributes to data protection and high-availability and helps ensure minimal planned and unplanned downtime or even continuous operations. Read this white paper to learn all about data protection and how it applies to your business.
Posted: 07 Mar 2012 | Published: 18 Jan 2012

Oracle Corporation

Staying Ahead of Cyberthreats: Recommendations for Financial Institutions
sponsored by Dell SecureWorks
WHITE PAPER: Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Dell SecureWorks

How to Effectively Secure Electronic Health Records
sponsored by HP and Intel
WHITE PAPER: In the ongoing effort to reach HIPPA Electronic Medical Record (EMR) compliance standards, one of the biggest concerns is security. Download this whitepaper to see how to develop a blanket of security for patients and your reputation through leveraging best practices for automated threat protection!
Posted: 29 Feb 2012 | Published: 29 Feb 2012

HP and Intel

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Information Governance: Audit and Protection on the IBM System z Platform
sponsored by IBM
WHITE PAPER: Over the last few years, organizations have realized that their ability to manage their business, remain compliant and mitigate risk will be compromised without 'rock solid' data. Read this white paper to discover the importance of protecting your enterprise information through proper management measures.
Posted: 09 Feb 2012 | Published: 30 Nov 2011

IBM

Balancing compliance with information security threat assessment
sponsored by IBM
EGUIDE: This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.
Posted: 06 Dec 2011 | Published: 06 Dec 2011

IBM

Sharpening the focus on mainframe security
sponsored by IBM
EGUIDE: Data breaches are becoming more common, with hackers targeting confidential information, causing losses in profitability, customer confidence and competitive advantage. As a result, mainframe security is under more scrutiny than ever before. Access this tip guide for steps every company can take to ensure the security of their most valuable data.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

IBM

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

ComputerWeekly.com
151 - 175 of 398 Matches Previous Page    5 6 7 8 9 10    Next Page
 
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement