ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Audits Research

  • E-Guide: Evaluating cloud security concerns

    Sponsored by: SearchSecurity.com

    The benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions.

  • E-Guide: Database Tools for Auditing and Forensics

    Sponsored by: SearchSecurity.com

    This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.

  • Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector

    Sponsored by: Dell SecureWorks

    Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.

  • Presentation Transcript: Has Your QSA Thrown You Under a Bus?

    Sponsored by: Dell SecureWorks

    After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.

  • Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council

    Sponsored by: Dell SecureWorks

    In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.

  • The Event Data Warehouse- Strategies for Improving Business Performance

    Sponsored by: Hexis Cyber Solutions Inc

    Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions.

  • GlobalSCAPE’s Cloud-based Managed File Transfer Solution Helps AVI-SPL Streamline Global Operations

    Sponsored by: Globalscape

    In this case study you will learn how GlobalSCAPE's cloud-based manged file transfer solution was able to help one business tremendously. Not only will you get insight into the different benefits of the solution, but you will also find out why GlobalSCAPE comes highly recommended due to customer service as well.

  • Enabling Continuous Compliance Across the Enterprise

    Sponsored by: IBM

    Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.

  • 2010 Endpoint Risk Assessment: Internal Vulnerabilities

    Sponsored by: Promisec

    This study will show you the most common security issues that were found and how they were dealt with by the various organizations.

  • E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options

    Sponsored by: IBM

    Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization.

  • Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance

    Sponsored by: Intel

    In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.

  • E-Guide: Monitoring Strategies for Insider Threat Detection

    Sponsored by: IBM

    In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.

  • Database Security Audit and Protect Critical Databases

    Sponsored by: Imperva

    Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.

  • Global Security Report 2011

    Sponsored by: Trustwave

    In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.

  • E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security

    Sponsored by: IBM

    Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.

  • All Qualified Security Assessors Are Not Created Equal

    Sponsored by: AT&T Corp

    The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment

  • Safe & Secure: An Overview of Security Features In JBoss Application Platforms

    Sponsored by: Red Hat

    Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.

  • E-Book: Technical Guide on Network Security Monitoring

    Sponsored by: SearchMidMarketSecurity

    SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.

  • Getting Ahead of Malware

    Sponsored by: Intel

    To minimize the threat of Malware, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches Intel’s user base. Continue reading to learn more.

  • Secure File Transfer Solution Saves Bank Time and Money

    Sponsored by: Linoma Software

    Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.

  • CORE IMPACT Pro V10

    Sponsored by: Core Security Technologies

    Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.

  • 7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction

    Sponsored by: Qualys, Inc.

    Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?

  • The Best PCI Audit of Your Life

    Sponsored by: Lumension

    This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.

  • Symantec Internet Security Threat Report: Trends for 2008

    Sponsored by: Symantec Corporation

    This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  • Information Security Magazine, May 2009: Automating Compliance

    Sponsored by: Information Security Magazine

    This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.