ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Research

  • PCI in the cloud: Compliance guide

    Sponsored by: TechTarget Security

    Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals.

  • The Need for Cloud Computing Security Standards

    Sponsored by: TechTarget Security

    While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.

  • February Technical Guide on Cloud Compliance

    Sponsored by: TechTarget Security

    In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.

  • February Essentials Guide on Threat Management

    Sponsored by: TechTarget Security

    Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.

  • Eguide: Top 10 risks in cloud computing and how to stay compliant

    Sponsored by: TechTarget Security

    Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.

  • Improving iPad enterprise management: Security primer

    Sponsored by: TechTarget Security

    Access this expert resource to learn about how to properly manage enterprise-owned iPads and how to combat potential security vulnerabilities.

  • May Technical Guide on PCI DSS Guidance

    Sponsored by: TechTarget Security

    This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.

  • Computer Weekly - 3 April 2012: Data security best practice

    Sponsored by: TechTarget ComputerWeekly.com

    This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.

  • Setting standards in IT Industries

    Sponsored by: DLT Solutions

    Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.

  • Killing Data

    Sponsored by: Voltage Security, Inc.

    Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.

  • Cybercrime Battle Basics

    Sponsored by: ThreatMetrix

    This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.

  • X-Force Mid-Year Trend Report

    Sponsored by: IBM

    This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.

  • Balancing compliance with information security threat assessment

    Sponsored by: IBM

    This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.

  • Non-compliance outweighs the cost of compliance

    Sponsored by: IBM

    Even though compliance has proven to be more of a chore for companies than a pleasant task, the facts show that when companies put the effort into complying, savings occur. Read this expert tip guide and discover why the cost of non-compliance is more than maintaining it.

  • Sharpening the focus on mainframe security

    Sponsored by: IBM

    Data breaches are becoming more common, with hackers targeting confidential information, causing losses in profitability, customer confidence and competitive advantage. As a result, mainframe security is under more scrutiny than ever before. Access this tip guide for steps every company can take to ensure the security of their most valuable data.

  • IBM Collaboration Software for the Apple iPhone and iPad Devices

    Sponsored by: IBM

    Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.

  • Is your security as good as the cloud’s?

    Sponsored by: Trend Micro, Inc.

    This paper examines the relative merits of Software-as-a-Service and Infrastructure-as-a-Service, as well as issues and risks to consider. View now to determine whether these models are likely to provide better or worse security than your current in-house security.

  • Aligning Security to Provide the Anticipated Business Results

    Sponsored by: AT&T Corp

    This resource looks at some of the more important questions IT managers should consider when implementing a security solutions strategy.

  • SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2

    Sponsored by: IBM

    This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.

  • SearchSecurity.com E-Guide: Balancing compliance with information security threat assessment

    Sponsored by: IBM

    While compliance regulations and standards have improved information security, they have also created unique challenges when it comes to adequately securing the organization. This expert tip offers authoritative, technical advice on how to balance compliance with your information security threat assessment.

  • Tackling Today’s Networking Challenges: How to Reduce the Risk and Protect Your Network from Security Vulnerabilities

    Sponsored by: HPE and Intel®

    This webinar presents important ways IT pros can protect their networks from security vulnerabilities.

  • Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector

    Sponsored by: Dell SecureWorks

    Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.

  • Presentation Transcript: Vulnerability Scanning and Compliance

    Sponsored by: Dell SecureWorks

    In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.

  • Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council

    Sponsored by: Dell SecureWorks

    In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.

  • Protecting User from Firesheep and Sidejacking Attacks with SSL

    Sponsored by: VeriSign EMEA

    This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.  

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.