Regulatory Compliance Reports

Eguide: Top 10 risks in cloud computing and how to stay compliant
sponsored by TechTarget Security
EGUIDE: Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

TechTarget Security

E-Guide: Are 'strong authentication' methods strong enough for compliance?
sponsored by TechTarget Security
EGUIDE: Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
Posted: 27 Sep 2011 | Published: 26 Sep 2011

TechTarget Security

E-Guide: Shortcut guide to Web application firewall deployment
sponsored by TechTarget Security
EGUIDE: Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

TechTarget Security

E-Guide: Using web application firewalls to ease compliance efforts
sponsored by TechTarget Security
EGUIDE: When properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

TechTarget Security

Compliance Frameworks That Enhance e-Discovery Effectiveness
sponsored by AXS-One, a Daegis Company
EGUIDE: The threat of e-discovery is a dark cloud hovering over an enterprise. These projects require an excess of effort and money – and requests are often made with no prior notice. Thankfully, records management can alleviate the pain of e-discovery. This e-guide provides a high-level view of records management in the workplace.
Posted: 21 Oct 2011 | Published: 21 Oct 2011

AXS-One, a Daegis Company

Securing the Cloud for the Enterprise
sponsored by Symantec Corporation
WHITE PAPER: Despite the many the benefits of the cloud, one key challenge still remains a concern – Security. View this paper as it explores the security challenges of the cloud and offers key principles that can help address the security and compliance concerns in an evolving threat and compliance landscape.
Posted: 23 Sep 2011 | Published: 22 Sep 2011

Symantec Corporation

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2
sponsored by IBM
EGUIDE: This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
Posted: 20 Sep 2011 | Published: 20 Sep 2011

IBM

SearchSecurity.com E-Guide: Balancing compliance with information security threat assessment
sponsored by IBM
EGUIDE: While compliance regulations and standards have improved information security, they have also created unique challenges when it comes to adequately securing the organization. This expert tip offers authoritative, technical advice on how to balance compliance with your information security threat assessment.
Posted: 20 Sep 2011 | Published: 20 Sep 2011

IBM

Iron Mountain EMR Scanning Survey Report
sponsored by Iron Mountain
WHITE PAPER: 70% of hospitals expect to meet EHR meaningful use guidelines this year. Yet, 78% expect to continue to treat patients using paper records for up to 5 more years despite the financial incentive for meeting these requirements. Inside this white paper, learn how your peers are transitioning to an EHR system.
Posted: 15 Sep 2011 | Published: 14 Sep 2011

Iron Mountain

Best practices for utilising SharePoint e-discovery capabilities
sponsored by Dell Software
EGUIDE: In this expert e-guide, discover how SharePoint 2010 can simplify e-discovery for your organisation. Plus, learn how to sell a governance plan to management by reminding them of the benefits.
Posted: 08 Sep 2011 | Published: 30 Aug 2011

Dell Software

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
sponsored by IBM
EGUIDE: Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program
sponsored by IBM
EGUIDE: This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization
sponsored by IBM
EGUIDE: Defining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Presentation Transcript: Has Your QSA Thrown You Under a Bus?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Presentation Transcript: Vulnerability Scanning and Compliance
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Leveraging XBRL for Value in Organizations
sponsored by ISACA
WHITE PAPER: This white paper was developed jointly by ISACA and IFAC, providing guidance on how to leverage value from XBRL initiatives and compliance requirements, with examples and case studies included.
Posted: 18 Aug 2011 | Published: 18 Aug 2011

ISACA

Technical Guide on SIM
sponsored by TechTarget Security
EGUIDE: Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.
Posted: 16 Aug 2011 | Published: 16 Aug 2011

TechTarget Security

August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders
sponsored by Information Security Magazine
EZINE: This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

Information Security Magazine

Minimize your financial institution’s risk with solutions from IBM
sponsored by IBM
WHITE PAPER: Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

IBM

Electronic Health Records: From Evaluation to Implementation
sponsored by DellEMC and Intel®
WHITE PAPER: With the enactment of the American Recovery & Reinvestment Act (ARRA), healthcare facilities can receive reimbursement for early adoption of Electronic Health Records (EHRs). However, late EHR adopters will be penalized through decreased Medicare and Medicaid reimbursements. Learn how ARRA could impact your healthcare facility.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

DellEMC and Intel®

E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy
sponsored by StoredIQ
EGUIDE: Is your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

StoredIQ

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
Posted: 15 Jul 2011 | Published: 05 Jul 2011

GeoTrust, Inc.

Enabling Continuous Compliance Across the Enterprise
sponsored by IBM
WHITE PAPER: Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM