Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed   
Compliance Best Practices Reports
1 - 25 of 551 Matches Previous Page  |  Next Page
The Sunshine Laws, Freedom of Information and Compliance
sponsored by Egress Software Technologies Inc
CASE STUDY: Learn how you can use Egress to minimize response time to information requests and avoid a costly violation.
Posted: 21 May 2020 | Published: 21 May 2020

Egress Software Technologies Inc

Building a Successful Cloud Infrastructure Security & Compliance Practice
sponsored by CloudHealth by VMware
WHITE PAPER: In order to implement effective cloud security, various teams and stakeholders across the organization need to work together to overcome the emerging security and compliance challenges. This white paper provides a comprehensive set of guidelines for organizations to streamline their collaboration efforts. Read on to learn more.
Posted: 21 May 2020 | Published: 21 May 2020

CloudHealth by VMware

GDPR vs CCPA
sponsored by Auth0
EBOOK: Inside this guide to GDPR vs. CCPA, discover what businesses need to know to close compliance gaps between the two laws and how Auth0’s identity management platform can help.
Posted: 19 May 2020 | Published: 19 May 2020

Auth0

Application Control and Critical Infrastructure Protection
sponsored by VMware International Unlimited Company
DATA SHEET: Reducing unscheduled downtime of critical systems as a result of a cyberattacks should be at the top of every organization’s security to-do list for this year. VMware Carbon Black wants to help. Read this data sheet to learn about their App Control offering, designed to eliminate unplanned downtime and protect critical systems at scale.
Posted: 18 May 2020 | Published: 27 Jan 2020

VMware International Unlimited Company

Beginners Guide – Securing Legacy Devices
sponsored by NetLib Security
RESOURCE: Medical devices often have lifespans averaging around 15 years. However, these aging devices are still required to meet the data protection benchmarks outlined by HIPAA. This article overviews how organizations with legacy devices can ensure data protection and meet compliance requirements. Read on to learn more.
Posted: 14 May 2020 | Published: 14 May 2020

NetLib Security

The Top 5 Open Source Vulnerabilities in Financial Institutions
sponsored by Sonatype
WHITE PAPER: In terms of operational efficiency, open source is unmatched. However, for the financial industry, heavy regulations make ensuring the security of open source applications difficult to manage and prove. In this white paper, take a closer look at the top five areas of vulnerability plaguing today’s financial services organizations.
Posted: 11 May 2020 | Published: 11 May 2020

Sonatype

The 2020 State of Compliance and Security Testing Report
sponsored by Synack
RESEARCH CONTENT: The 2020 State of Compliance and Security Testing Report provides some conclusions on 2020 imperatives of security teams including program structure and ownership, compliance requirements, testing approach and vendor strategy. Read on to reveal the results.
Posted: 11 May 2020 | Published: 11 May 2020

Synack

Cloud Security Assessment Workshop
sponsored by Cloud4C
BROCHURE: As organizations continue to migrate to the cloud, it’s critical that they don’t lose sight of their security and compliance objectives. This brochure provides an overview of what to expect in the CAF cloud security assessment workshop, designed to review your current strategy and make recommendations based on your compliance and security needs.
Posted: 08 May 2020 | Published: 08 May 2020

Cloud4C

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

Growing Profits and Achieving Compliance with Privacy by Design
sponsored by Dell Boomi and Slalom
EBOOK: In order to meet the demands of new data privacy laws and changing customer attitudes, organizations need to prioritize data protection above all else. However, if data privacy was built-in from the start, it could be used as a competitive advantage. This e-book highlights best practices and strategic advice for how to achieve this.
Posted: 07 May 2020 | Published: 07 May 2020

Dell Boomi and Slalom

State of Software Security: Volume 10
sponsored by Veracode, Inc.
WHITE PAPER: For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

Industry and Financial Regulations: The Implications for Application Security
sponsored by Veracode, Inc.
WEBCAST: Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.
Posted: 05 May 2020 | Premiered: May 5, 2020

Veracode, Inc.

Increase Security and Compliance with Advanced Automation
sponsored by Red Hat
PRODUCT OVERVIEW: Security is a top concern among telecommunications organizations, especially when it comes to securing customer data and meeting compliance requirements. In this solution brief, look at the features of Red Hat’s automated security and compliance offerings and discover how they can help your organizations achieve security and compliance benchmarks.
Posted: 05 May 2020 | Published: 05 May 2020

Red Hat

Security and Privacy with Pexip
sponsored by Pexip
DATA SHEET: Pexip offers security-first, enterprise-grade video conferencing solutions using industry-standard encryption and security protocols to maintain privacy and security. Download this brief to learn more about the security features of Pexip.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Pexip

VMware Carbon Black Cloud Audit and Remediation
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Cloud Audit and Remediation, designed to deliver real-time assessment and remediation for faster, easier access to audit and reconfigure endpoints across their organization.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

VMware International Unlimited Company

Why Native Security Controls in Public Clouds Are Not Enough
sponsored by Palo Alto Networks
WHITE PAPER: According to Gartner, cloud security should not be viewed as “Is the cloud secure?” but instead as “Am I using the cloud securely?” This e-book highlights key objectives and best practices for ensuring your organization is using public cloud environments securely. Read on to get started.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Palo Alto Networks

The Latest Trends in Advanced Authentication Solutions
sponsored by HID Global
WHITE PAPER: It’s estimated that the cost of breaches, identity theft and other cybercrimes will reach $6 trillion by 2021, doubling their cost from 2015. In order to combat these threats, organizations are embracing identity and access management (IAM) to protect sensitive data. Read on to learn more about the latest IAM threats and trends.
Posted: 27 Apr 2020 | Published: 27 Jan 2020

HID Global

An Anchor of Trust in a Digital World: Risk Management Strategies for Digital Processes
sponsored by Thales
WHITE PAPER: A growing number of entities have integrated Hardware Security Modules (HSMs) into their information risk management deployments. In this white paper, learn about hardware security modules and the attributes that position HSMs as an attractive component in information risk management.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Thales

Skybox Security Solutions
sponsored by Skybox Security
PRODUCT OVERVIEW: As cyberattacks continue to plague organizations through a growing number of vectors, cybersecurity needs become increasingly unique for each network. Read on to unlock this guide, which highlights the key features of each of Skybox Security’s offerings.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

Skybox Security

Advantages of Using A Hosted Payment Page
sponsored by SFG
WHITE PAPER: For organizations interested in selling their products or services online, establishing payment processing and ensuring PCI compliance can be an enormous barrier to entry. To ease the workload, organizations are turning to hosted payment pages. This whitepaper explores how hosted pages work and highlights their key benefits.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

SFG

Government insists 'nothing sinister' about web user data gathering
sponsored by ComputerWeekly.com
EGUIDE: Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

ASD/ACSC Maturity Model 2019 – Three Things You Need to Check
sponsored by Ivanti ANZ
RESOURCE: The Australian Signals Directorate (ASD)/Australia Cyber Security Centre (ACSC) breaks down their model into a 3-level self-assessment in order to help organizations on their journey towards maturity. In this article, discover 3 simple things to check for your level 3 maturity self-assessment.
Posted: 22 Apr 2020 | Published: 16 Oct 2019

Ivanti ANZ

2020 State of Enterprise Cloud Adoption and Security
sponsored by DivvyCloud
WHITE PAPER: Cloud usage has been growing steadily over recent years, and that trend is expected to continue. However, misconfigurations and data breaches have led to security concerns. This report highlights the findings from a 2019 study into enterprise cloud adoption as well as security and compliance challenges. Read on to uncover the results.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

DivvyCloud

How the CLOUD Act affects you
sponsored by IONOS
VIDEO: Regulations can always change, so you need to plan accordingly and future-proof your infrastructure. Watch this webinar to learn more about the US CLOUD Act, how it affects your customers, and what you can do about it with regards to staying GDPR-compliant.
Posted: 22 Apr 2020 | Premiered: 15 Apr 2020

IONOS

Cybersecurity for Community Banks and Credit Unions
sponsored by Guardicore
WHITE PAPER: In order to meet customer expectations for cybersecurity as well as regulatory requirements, financial institutions like banks and credit unions are putting the security of sensitive data at the top of their priorities. In this white paper, explore key challenges these financial institutions are facing and how to overcome them.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

Guardicore
1 - 25 of 551 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info