IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 
Definition continues below.
Information SecurityReports
76 - 100 of 362 Matches Previous Page  | Next Page
Fair exchange protocols with anonymity and non-repudiation for payments
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Information Classification: Information Stewardship in Practice
sponsored by TITUS
WHITE PAPER: Information classification is vital for comprehensive information security. This whitepaper discusses the role that information classification plays in information stewardship, and also explains the organizational framework and technologies you need to implement it correctly. Read on to learn more.
Posted: 29 Apr 2013 | Published: 01 Apr 2013

TITUS

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

CW buyer's guide: context-aware security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Security Intelligence for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores how a new security information and event management (SIEM) system provides the unparalleled protection your organization needs to face the risks of big data.
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett-Packard Company

CIO Handbook: The Risk Management Approach to Information Governance
sponsored by SearchCompliance.com
EBOOK: This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.
Posted: 19 Apr 2013 | Published: 20 Mar 2013

SearchCompliance.com

Cisco Annual Security Report
sponsored by Cisco
WHITE PAPER: Check out this report from Cisco to get insight into expert research and security intelligence. Learn more about global threat trends, improving security posture, and more.
Posted: 10 Apr 2013 | Published: 07 Apr 2014

Cisco

Rethinking Your Enterprise Security
sponsored by Hewlett-Packard Company
WHITE PAPER: The fact is that the world is constantly evolving, and always connected, and your enterprise must be too. View this resource to learn about modern threats and what you should do to remains safe.
Posted: 03 Apr 2013 | Published: 31 May 2012

Hewlett-Packard Company

Providing Security for Software Systems in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this whitepaper to learn about the risks to software deployed in the cloud and what steps you can take to mitigate that risk.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

Hewlett-Packard Company

Enabling the secure use of RFID
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Dario Bevilacqua and Keith Mayes  describe the design of an UHF RFID system for secure identification and tracking.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

ComputerWeekly.com

Recordkeeping Needs Assessment Case Study: Using the Cloud to Improve Dismal Scores
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom explores the methodology used to conduct an early Generally Accepted Recordkeeping Principles® needs assessment (N.A.), followed by a discussion of how the N.A. led to the selection of a Cloud provider to improve dismal scores.
Posted: 02 Apr 2013 | Premiered: 02 Apr 2013


Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Information Governance University: Records Management Strategy, Transparency and Collaboration Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This session discusses expert strategies on simplifying records management
Posted: 06 Mar 2013 | Premiered: 07 Feb 2013

SearchCompliance.com

Information Lifecycle Governance Leader Reference Guide
sponsored by IBM
WHITE PAPER: Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

IBM

The Improvement and Evolution of SIEM
sponsored by Hewlett-Packard Company
EGUIDE: Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Hewlett-Packard Company

PCI Council issues mobile application rules for software developers
sponsored by Hewlett-Packard Company
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Hewlett-Packard Company

Improving Enterprise Email Security: Systems and Tips
sponsored by Kaspersky Lab
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

Kaspersky Lab

Six Email Security Best Practices for Email SaaS
sponsored by Kaspersky Lab
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Discover the Risks and Rewards Behind a Mobile Workforce
sponsored by More Direct
EGUIDE: Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

More Direct

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

Go Daddy Sets a New Standard for SecureOnline Experiences
sponsored by Trend Micro
WHITE PAPER: As a top web hosting company, Go Daddy has a big responsibility to its more than 9 million customers to provide comprehensive data security from today's threats. Read on to find out how Go Daddy was able to improve protection and ensure fast, flexible response to ever-changing threats with low total cost of ownership.
Posted: 11 Apr 2013 | Published: 31 Dec 2011

Trend Micro

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit
sponsored by Attachmate Corporation
CASE STUDY: This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more!
Posted: 09 Apr 2013 | Published: 30 Mar 2012

Attachmate Corporation

Application Visibility and Control
sponsored by Aerohive Networks
WHITE PAPER: Read on to discover a way you can visualize, monitor and manage your edge network infrastructure, and learn how to keep track of when and where users are attempting to access your network and how it is being used.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Aerohive Networks

Information Security Magazine - April 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

SearchSecurity.com

Network Security Technologies Technical Guide
sponsored by SearchSecurity.com
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

SearchSecurity.com
76 - 100 of 362 Matches Previous Page    2 3 4 5 6 7    Next Page
 
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement