Federal Information Security Management Act of 2002 Research
-
Protecting Critical Data is a Main Priority for the U.S. Army
Sponsored by: GlobalscapeIn this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
-
June Issue of Information Security magazine: Mobile Security: A New Game Plan
Sponsored by: Information Security MagazineThis month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges.
-
The Complete Guide to Log and Event Management
Sponsored by: Novell, Inc.This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
-
Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
Sponsored by: Silver Tail SystemsThis e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
-
FISMA Compliance: A Holistic Approach to FISMA and Information Security
Sponsored by: IBMIBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
-
Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
Sponsored by: Tripwire, Inc.Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
-
Seven Practical Steps for Federal Cyber Security and FISMA Compliance
Sponsored by: Tripwire, Inc.This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.