IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

LumensionImproving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV

While traditional anti-virus (AV) solutions can provide protection for endpoints, constantly running AV processes with potentially frequent signature updates can consume resources that could otherwise be used to provide application services to users.

Read more...
 
E-mail

Voltage WPData Sheet: Voltage SecureData Suite for Test/Dev

Generating data for test and development environments presents serious challenges for enterprise security and risk management. When data is copied from production databases and used directly for test/development, large volumes of private data accumulate on unprotected servers and workstations. The use of outsourced and offshore QA and development services further increases the risks. An alarming number of data breaches, along with complex regulatory compliance requirements, highlight the need to de-identify sensitive data when moving from production to test, development, and training environments.

Read more...
 
E-mail

Coalfire WPSEC Cybersecurity Guidance... Critical Disclosure Considerations

SEC Cyber Risk Guidance Overview and SEC Cyber Risk Disclosure Issues.

Read more...
 
E-mail

VoltageUse Case Brief: Ensuring Privacy for PII and PHI in Regulated Industries

Competing encryption offerings we looked at would have required us to hire three or four dedicated administrators to keep everything running smoothly. Voltage SecureMail can be managed with our regular email administrative staff, saving us a lot of time and money.

Read more...
 
E-mail

White PaperTop 5 Questions for a CISO

Thankfully, most organizations now have a Chief Information Security Officer. The CISO's primary function is to stand in the gap between the business and all the IT related risks that surround the modern-day organization. He or she may have a staff of trained security professionals, or perhaps your leader has engaged third party service providers for many of the necessary controls. Regardless, the CISO is the where 'the buck stops' when it comes to IT risk management.

Read more...
 
E-mail

www.TRUSTe.comTRUSTe 2014 US Consumer Confidence Privacy Report

As part of our commitment to helping companies to safely collect and use consumer data to power their businesses, we wanted to get behind the headlines and find out what effect the events of 2013 have had on consumer privacy concerns and provide an accurate picture of the potential impact this could have on businesses in the year ahead.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »
Page 1 of 12

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner