Security Standards Research
-
Information Security Magazine, July 09: Controlling Privileged Accounts
Sponsored by: Information Security MagazineThis month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.
-
Securing the Organization: Creating a Partnership between HR and Information Security
Sponsored by: ISC2The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
-
Automated Compliance: Making the Case and Reaping the Rewards
Sponsored by: Tripwire, Inc.Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
-
Addressing Compliance Initiatives with Center for Internet Security Benchmarks
Sponsored by: Tripwire, Inc.This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
-
Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
Sponsored by: Embarcadero Technologies, Inc.Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
-
The CIO's Guide to Mobile Security
Sponsored by: BlackBerryLearn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
-
Video - Vulnerability Management in a Web 2.0 World
Sponsored by: LumensionLumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
-
Enterprise Security Solutions by Trend Micro
Sponsored by: Trend Micro, Inc.This resource center will help you better understand Web threats, how they function, and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
-
Facilitating Enterprise PCI DSS Compliance - Executive Summary
Sponsored by: GlobalscapeThe GlobalSCAPE HS-PCI solution provides a comprehensive mechanism to quickly bring your organization into compliance with key requirements.
-
Deploying a Wireless LAN
Sponsored by: BlackBerryMany factors must be considered when planning for a WLAN deployment. This paper provides a starting point for posing questions to WLAN equipment and service vendors.
-
Enterprise-Grade Wireless LAN Security
Sponsored by: SiemensThis white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.