ComputerWeekly.com Research Library

Powered by Bitpipe.com

Regulatory Compliance Research

  • Eguide: Top 10 risks in cloud computing and how to stay compliant

    Sponsored by: TechTarget Security

    Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.

  • E-Guide: Are 'strong authentication' methods strong enough for compliance?

    Sponsored by: TechTarget Security

    Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.

  • E-Guide: Shortcut guide to Web application firewall deployment

    Sponsored by: TechTarget Security

    Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.

  • E-Guide: Using web application firewalls to ease compliance efforts

    Sponsored by: TechTarget Security

    When properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.

  • Compliance Frameworks That Enhance e-Discovery Effectiveness

    Sponsored by: AXS-One, a Daegis Company

    The threat of e-discovery is a dark cloud hovering over an enterprise. These projects require an excess of effort and money – and requests are often made with no prior notice. Thankfully, records management can alleviate the pain of e-discovery. This e-guide provides a high-level view of records management in the workplace.

  • Securing the Cloud for the Enterprise

    Sponsored by: Symantec Corporation

    Despite the many the benefits of the cloud, one key challenge still remains a concern – Security. View this paper as it explores the security challenges of the cloud and offers key principles that can help address the security and compliance concerns in an evolving threat and compliance landscape.

  • SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2

    Sponsored by: IBM

    This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.

  • SearchSecurity.com E-Guide: Balancing compliance with information security threat assessment

    Sponsored by: IBM

    While compliance regulations and standards have improved information security, they have also created unique challenges when it comes to adequately securing the organization. This expert tip offers authoritative, technical advice on how to balance compliance with your information security threat assessment.

  • Iron Mountain EMR Scanning Survey Report

    Sponsored by: Iron Mountain

    70% of hospitals expect to meet EHR meaningful use guidelines this year. Yet, 78% expect to continue to treat patients using paper records for up to 5 more years despite the financial incentive for meeting these requirements. Inside this white paper, learn how your peers are transitioning to an EHR system.

  • Best practices for utilising SharePoint e-discovery capabilities

    Sponsored by: Dell Software

    In this expert e-guide, discover how SharePoint 2010 can simplify e-discovery for your organisation. Plus, learn how to sell a governance plan to management by reminding them of the benefits.

  • SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools

    Sponsored by: IBM

    Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.

  • SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program

    Sponsored by: IBM

    This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.

  • SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization

    Sponsored by: IBM

    Defining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis.

  • SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes

    Sponsored by: IBM

    This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.

  • Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector

    Sponsored by: Dell SecureWorks

    Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.

  • Presentation Transcript: Has Your QSA Thrown You Under a Bus?

    Sponsored by: Dell SecureWorks

    After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.

  • Presentation Transcript: Vulnerability Scanning and Compliance

    Sponsored by: Dell SecureWorks

    In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.

  • Leveraging XBRL for Value in Organizations

    Sponsored by: ISACA

    This white paper was developed jointly by ISACA and IFAC, providing guidance on how to leverage value from XBRL initiatives and compliance requirements, with examples and case studies included.

  • Technical Guide on SIM

    Sponsored by: TechTarget Security

    Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.

  • August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders

    Sponsored by: Information Security Magazine

    This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.

  • Minimize your financial institution’s risk with solutions from IBM

    Sponsored by: IBM

    Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.

  • Electronic Health Records: From Evaluation to Implementation

    Sponsored by: DellEMC and Intel®

    With the enactment of the American Recovery & Reinvestment Act (ARRA), healthcare facilities can receive reimbursement for early adoption of Electronic Health Records (EHRs). However, late EHR adopters will be penalized through decreased Medicare and Medicaid reimbursements. Learn how ARRA could impact your healthcare facility.

  • E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy

    Sponsored by: StoredIQ

    Is your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.

  • Choosing a Cloud Provider with Confidence

    Sponsored by: GeoTrust, Inc.

    In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.

  • Enabling Continuous Compliance Across the Enterprise

    Sponsored by: IBM

    Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.