Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Auditing

RSS Feed   
Compliance Auditing Reports
 
NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE: NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Contrast Security

Achieving HIPAA Compliance
sponsored by Absolute Software Corporation
WHITE PAPER: The HITECH Act of 2013 expanded who was considered a covered entity (CE) when it came to HIPAA compliance. This whitepaper provides an introductory overview of key consideration areas and guidance for getting started to help your organization avoid HIPAA and HITECH penalties – download now to get started.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Absolute Software Corporation

A simple and effective security layer for digital communications
sponsored by Zivver
CASE STUDY: In this case study, follow the journey of Agency DNA, a business management consultancy, as they partner with Zivver to establish a simple and effective data protection program that addresses key challenges related to compliance, user experience, and more – read on to unlock the full story.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Zivver

KuppingerCole Market Compass IT-GRC Tools
sponsored by ServiceNow
WHITE PAPER: IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
Posted: 12 Oct 2020 | Published: 21 Jul 2020

ServiceNow

Securing Big Data Analytics
sponsored by Comforte AG
WHITE PAPER: Not only are the uses and benefits of big data expanding, so are the environments where it is collected and analyzed. Increasingly, data is ending up in the hands of cybercriminals. In this white paper, learn more about this fundamentally different approach to protecting sensitive data.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Comforte AG

Enhancing security automation
sponsored by HelpSystems
BROCHURE: As the volume of data grows, improving data security efforts becomes increasingly critical as well as more difficult. This brochure provides a closer look at how Titus is incorporating automation and artificial intelligence (AI) into data security efforts in order to manage increasing pressures.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

HelpSystems

Cybersecurity in Financial Services: Orchestrating the Best Defense in an Evolving Threat Landscape
sponsored by ServiceNow
WHITE PAPER: Financial Services has been a targeted sector and cybercrime is becoming sophisticated on an industrial scale. A more strategic and wholesale approach needs to be adopted industry-wide to fend off the threat. In this white paper, learn how organizations can leverage technology to get a holistic view of their entire business.
Posted: 24 May 2019 | Published: 28 Feb 2019

ServiceNow

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Strategies for Writing a HIPAA-friendly BYOD Policy
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
Posted: 01 Aug 2013 | Published: 05 Mar 2013

HP & Intel®
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences