ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Research

  • E-Guide: PCI DSS 2011: Key themes to watch

    Sponsored by: TechTarget Security

    This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.

  • E-Guide: Best Practices for Securing Your Network

    Sponsored by: DellEMC and Intel®

    This expert e-guide explains how to effectively secure your network with a practical defense-in-depth approach to security. You’ll also find the critical elements all organizations must review as they consider SaaS products.

  • Presentation Transcript: ISACA PCI Compliance Symposium

    Sponsored by: Intel

    Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.

  • Achieving PCI compliance with Dell SecureWorks' security services

    Sponsored by: DellEMC and Intel®

    It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.

  • May Issue of Information Security Magazine: Data Protection: Going the Distance

    Sponsored by: Information Security Magazine

    This month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time.

  • Buyer’s Guide for Access Management

    Sponsored by: Oracle Corporation

    Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.

  • ISACA PCI Compliance Symposium

    Sponsored by: Intel

    As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.

  • Reducing PCI DSS Scope: The Gateway Approach

    Sponsored by: Intel

    This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.

  • Rethinking Information Security to Improve Business Agility

    Sponsored by: Intel

    To enable rapid adoption on new technology and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel's information security architecture. Continue reading to learn more.

  • Forrester Study: The Total Economic Impact of Oracle Identity Analytics

    Sponsored by: Oracle Corporation

    Based on real customers' data, this comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution.

  • Access Certification: Addressing and Building on a Critical Security Control

    Sponsored by: Oracle Corporation

    This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.

  • How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online

    Sponsored by: VeriSign EMEA

    If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper.

  • Register Free to Visit Infosecurity Europe - 19th - 21st April 2011

    Sponsored by: Infosecurity Europe

    Europe's No. 1 Information Security event, with an unrivalled free education programme, exhibitors showcasing new and emerging technologies and offering practical and professional expertise.

  • Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation

    Sponsored by: Tripwire, Inc.

    This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.

  •  Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

  • PCI DSS: Next-Generation Data Security, Storage and Integrity

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.

  • E-Book: The Dark Side of Cloud Computing

    Sponsored by: Astaro

    Ask who controls the most powerful computing cloud in operation and Amazon EC2 or one of their competitors springs to mind. However there are other cloud computers which exist today that can directly challenge their might. Botnets and their creators represent a darker side of the Internet where money is a powerful motivator for creativity.

  • Data Leak Protection Planning

    Sponsored by: (ISC)2 UK Ltd

    It's becoming more critical and more challenging to prevent data from leaking outside the organization. Read this ebook for expert tips and advice on plugging the holes in your organization's date security system.

  • Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

    Sponsored by: VeriSign Australia

    This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.

  • Hardware and Software Authentication: Choosing the Right Approach

    Sponsored by: SafeNet, Inc.

    This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.

  • Detect and Survive

    Sponsored by: Guidance Software, Inc.

    This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.

  • Smart Policies for Personal-Liable Smartphones

    Sponsored by: BlackBerry

    This white paper addresses how businesses and employees can compromise between personal and business smartphone use, as well as benefit by establishing personal-liable smartphone policies.

  • Airport Insecurity: The Case of Lost Laptops

    Sponsored by: Dell India

    This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers.

  • The Critical Security Controls – Moving Beyond the Checklist Mentality

    Sponsored by: Lumension

    The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.

  • PCI Compliance Made Simple

    Sponsored by: Alert Logic

    Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.