Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
1 - 25 of 217 Matches Previous Page  |  Next Page
The Top 5 Open Source Vulnerabilities in Financial Institutions
sponsored by Sonatype
WHITE PAPER: In terms of operational efficiency, open source is unmatched. However, for the financial industry, heavy regulations make ensuring the security of open source applications difficult to manage and prove. In this white paper, take a closer look at the top five areas of vulnerability plaguing today’s financial services organizations.
Posted: 11 May 2020 | Published: 11 May 2020

Sonatype

Cloud Security Assessment Workshop
sponsored by Cloud4C
BROCHURE: As organizations continue to migrate to the cloud, it’s critical that they don’t lose sight of their security and compliance objectives. This brochure provides an overview of what to expect in the CAF cloud security assessment workshop, designed to review your current strategy and make recommendations based on your compliance and security needs.
Posted: 08 May 2020 | Published: 08 May 2020

Cloud4C

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

Growing Profits and Achieving Compliance with Privacy by Design
sponsored by Dell Boomi and Slalom
EBOOK: In order to meet the demands of new data privacy laws and changing customer attitudes, organizations need to prioritize data protection above all else. However, if data privacy was built-in from the start, it could be used as a competitive advantage. This e-book highlights best practices and strategic advice for how to achieve this.
Posted: 07 May 2020 | Published: 07 May 2020

Dell Boomi and Slalom

State of Software Security: Volume 10
sponsored by Veracode, Inc.
WHITE PAPER: For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

Increase Security and Compliance with Advanced Automation
sponsored by Red Hat
PRODUCT OVERVIEW: Security is a top concern among telecommunications organizations, especially when it comes to securing customer data and meeting compliance requirements. In this solution brief, look at the features of Red Hat’s automated security and compliance offerings and discover how they can help your organizations achieve security and compliance benchmarks.
Posted: 05 May 2020 | Published: 05 May 2020

Red Hat

VMware Carbon Black Cloud Audit and Remediation
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Cloud Audit and Remediation, designed to deliver real-time assessment and remediation for faster, easier access to audit and reconfigure endpoints across their organization.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

VMware International Unlimited Company

NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE: NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Contrast Security

Help Reduce Cyber Risks and Simplify Your Journey to Compliance
sponsored by AT&T Cybersecurity
PRODUCT OVERVIEW: For organizations with a limited IT budget, gaining the visibility needed to understand security risks and address compliance requirements is a cumbersome task. In this solution brief, explore the features and capabilities of AT&T Cybersecurity – designed to simplify compliance and security – to see if it’s a good fit for your needs.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

AT&T Cybersecurity

AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.
Posted: 10 Apr 2020 | Published: 30 Mar 2020

Contrast Security

Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector
sponsored by NetLib Security
CASE STUDY: In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

Reclaim Your Compliance Training
sponsored by Cornerstone OnDemand
WHITE PAPER: Download this white paper to learn how you can reclaim compliance training and move past negative connotations to get more value out of it.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Cornerstone OnDemand

GDPR Compliance support that works for your business
sponsored by TITUS
PRODUCT OVERVIEW: GDPR is forcing organizations to rethink their workflows and achieve broader visibility into personal data collection. In this solution brief, take a closer look at Titus’ offering that is powered by machine learning to help identify what data you have, how sensitive it is, and how it should be handled by your security stack.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

TITUS

The 4 Levels of Automated Remediation
sponsored by DivvyCloud
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

DivvyCloud

Cloudian HyperStore Compliance Assessment
sponsored by Cloudian
EBOOK: In this e-book, Cohasset Associates has been called upon to assess the capabilities of Cloudian HyperStore. Read on to learn Cohasset’s opinion on HyperStore which includes whether or not it retains records requiring time-based retention in compliance with the recording and non-rewritable, non-erasable storage of electronic records.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Cloudian

4 Ways SailPoint Predictive Identity Puts You in Control
sponsored by SailPoint Technologies
WHITE PAPER: As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

Creating an Identity-Aware Organization from Infrastructure to Users
sponsored by SailPoint Technologies
WHITE PAPER: Cybercriminals are no longer just hacking through your firewall to gain entry to your infrastructure. They have found another, easier path in – your users. In this white paper, learn how identity management is key to ensure a secure, compliant and efficient infrastructure.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

The CCPA: Security Standards and Measures to Comply
sponsored by Crosskey Cyber Security
RESOURCE: The CCPA is now operative and the Attorney General can begin enforcement actions against businesses on July 1 of this year. Even if you believe you are not subject to the CCPA, it is a good idea for SMBs to comply with the standard for many reasons. In this blog, learn about the cybersecurity standard SMBs need to meet to satisfy the CCPA.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Crosskey Cyber Security

Wichita State University
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Wichita State University’s (WSU) IT team partnered with Absolute to establish endpoint visibility and control protocols in order to protect their students and faculty while meeting compliance requirements.
Posted: 24 Feb 2020 | Published: 09 May 2019

Absolute Software Corporation

Cisco - From Privacy to Profit: Achieving Positive Returns on Privacy Investments
sponsored by Cisco Umbrella
WHITE PAPER: Privacy has become a critical business imperative, with organizations seeing significant ROI due to improvements in privacy and operational efficiency. Download this year’s Cisco Data Privacy Benchmark Study to take a closer look at the key findings around the benefits of data privacy.
Posted: 07 Feb 2020 | Published: 31 Jan 2020

Cisco Umbrella

2020 Sales Tax Changes
sponsored by Avalara
WHITE PAPER: Local sales and use tax rates often change in many states at the start of each year—which is what happened on January 1, 2020. Learn about the new regulations that took effect in 25 states, and how sales tax automation software can help you adjust in this white paper.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Avalara

Taking Your Business in a New Direction
sponsored by Avalara
WHITE PAPER: Download this paper to explore how shifting products and sales channels can impact tax compliance — as well as best practices to successfully navigate these changeswhile minimizing risk.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Avalara

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

Supporting GRC with Business Continuity and Disaster Recovery
sponsored by Cirrus Data Solutions
EGUIDE: Read this exclusive guide to discover how BC can support GRC initiatives and how to use the data acquired during BIA and RA activities to support GRC.
Posted: 28 Jan 2020 | Published: 27 Jan 2020

Cirrus Data Solutions

CCPA Compliant Email Security
sponsored by Egress Software Technologies Inc
DATA SHEET: In this Egress product datasheet, learn how you can remain CCPA compliant by preventing breaches, protecting regulated data, fulfilling DSARs, and auditing your email network.
Posted: 28 Jan 2020 | Published: 28 Jan 2020

Egress Software Technologies Inc
1 - 25 of 217 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info