IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

www.lumension.comAchieving Compliance with the Massachusetts Data Protection Law

By March 1, 2010, all organizations with operations and/or customers in the state of Massachusetts will be required to follow comprehensive information security requirements regarding both paper and electronic records containing personal information. These requirements include enforcing password security, encrypting all personal information stored on laptops and removable devices and ensuring up-to-date firewall protection, operating system patches and the latest versions of security agent software. Read this whitepaper to learn how your organization can meet the necessary requirements and improve its security practices.

Read more...
 

enterasyslogoDistributed Intrusion Prevention System

Traditional IPS and firewalls fall short of providing effective threat containment and can expose the enterprise to unacceptable levels of risk. As the majority of threats now originate from inside the organization rather than outside, security needs to be everywhere, rather than just at select perimeter locations.

Read more...
 

Striking a Balance between Governance, Risk and Compliance

A new study commissioned by SAP, the world's largest business software company, draws on a survey conducted by Healthcare IT News and Healthcare Finance News to share strategies that will improve governance, compliance and business performance across today's healthcare organization.

Read more...
 

Information Security & Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy

Read this white paper about a tactical guide enabling you to take action and achieve operational excellence.

Read more...
 

File Integrity Monitoring: Compliance and Security for Virtual and Physical Environments

Read this white paper to find out the first solution to effectively combine configuration assessment and file integrity monitoring, enabling automated and sustainable configuration control throughout virtual and physical infrastructures.

Read more...
 

www.ostermanresearch.comConvincing Decision Makers of the Critical Need for Archiving

This white paper discusses the various reasons to archive email and other electronic content. However, it goes beyond that to provide some concrete reasons and justification for deploying and maintaining an archiving system, most of which are based on the cost savings that archiving can provide - both direct cost savings and reduced costs arising from lowered risk.

Read more...
 

WireheadSound Bank Secures Information, Reassures Customers with Regular Vulnerability Assessments and Penetration Testing

Sound Bank, headquartered in Morehead City, North Carolina, has grown over years of operation from an upstart bank with twelve employees to a thriving community bank with $133 million in assets, business has expanded, the Bank has made it a policy to protect their valuable financial information by conducting regular vulnerability assessment and penetration testing.

Read more...
 

WireheadThe Eastern Band of the Cherokee Nation Protects Tribal and Government Information with Extensive Penetration Testing

The Eastern Band of the Cherokee Nation Protects Tribal and Governmental Information with Extensive The Eastern Band of the Cherokee Nation members, half of whom live on tribal land in North Carolina near the Great Smoky Mountains National Park.

Read more...
 

WireheadThorough Testing Secures Canal Insurance Company's Web Applications and Sensitive Information

Canal Insurance Company has insured commercial truckers for over 60 years. Headquartered in Greenville, South Carolina, the company provides a wide range of insurance products through a nationwide network of independent agents.

Read more...
 

IBMA smarter approach to archiving

Today, almost anything across an enterprise's systems can be made digitally aware and interconnected. And given the business challenges of a smaller, flatter and more complex world, rethinking what information we store and how our information infrastructures work is a must.

Read more...
 
Page 7 of 26

  Most Popular | All