Security Audits Research
-
Information Security Threats: Building Risk Resilience
Sponsored by: TechTarget SecurityEnterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
-
Security Big Data: Preparing for a Big Data Collection Implementation
Sponsored by: TechTarget SecurityThis expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
-
Creating a Compliance Culture: Best Practices
Sponsored by: TechTarget SecurityCheck out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
-
E-Guide: Evaluating cloud security concerns
Sponsored by: TechTarget SecurityThe benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions.
-
System z: Making great security even better
Sponsored by: IBMAdopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
-
Strategies to Maintain PCI DSS Compliance
Sponsored by: GeoTrust, Inc.This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
-
Creating the Ultimate Security Platform
Sponsored by: IBMThis whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
-
Identity and Access Management Buyer's Guide
Sponsored by: IBMThis buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
-
Quick Dirty Dozen PCI Compliance Simplified
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
-
Panda Security and Minopex - Case Study
Sponsored by: Panda SecurityLearn how a mining organization was able to integrate a cloud systems management tool into their existing security solutions to streamline audits, make diagnoses and resolve incidents wherever they are and whenever they arise.
-
PowerBroker Password Safe: Security, Compliance, Productivity
Sponsored by: BeyondTrust CorporationUncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
-
Computer Weekly – 2 April 2013: The benefits of context-aware security
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
-
Security-In-Depth Using Integrated Risk-Conscious Controls
Sponsored by: Tripwire, Inc.This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
-
Improving regulatory compliance management through log analysis, SIM
Sponsored by: HP Enterprise SecurityThis E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
-
Governance and control: Focus risk management on multiple levers of control
Sponsored by: IBMWritten by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
-
SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
Sponsored by: IBMAuditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
-
SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization
Sponsored by: IBMDefining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis.
-
Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector
Sponsored by: Dell SecureWorksDell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.
-
Presentation Transcript: Has Your QSA Thrown You Under a Bus?
Sponsored by: Dell SecureWorksAfter working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.
-
Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council
Sponsored by: Dell SecureWorksIn this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.
-
The Event Data Warehouse- Strategies for Improving Business Performance
Sponsored by: Hexis Cyber Solutions IncOrganizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions.
-
GlobalSCAPE’s Cloud-based Managed File Transfer Solution Helps AVI-SPL Streamline Global Operations
Sponsored by: GlobalscapeIn this case study you will learn how GlobalSCAPE's cloud-based manged file transfer solution was able to help one business tremendously. Not only will you get insight into the different benefits of the solution, but you will also find out why GlobalSCAPE comes highly recommended due to customer service as well.
-
Enabling Continuous Compliance Across the Enterprise
Sponsored by: IBMToday's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.
-
2010 Endpoint Risk Assessment: Internal Vulnerabilities
Sponsored by: PromisecThis study will show you the most common security issues that were found and how they were dealt with by the various organizations.
-
E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options
Sponsored by: IBMCreating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization.