IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

CoalfireWhite Paper: HIPAA and HITRUST - FAQ

The objective of this document is to provide guidance to Covered Entities, Business Associates, and subcontractors (as defined by HIPAA), and to assist in identifying the best overall approach to becoming compliant and secure in the healthcare industry.


CoalfireRisk Analysis versus Risk Assessment... What's the Difference?

Risk analysis.....risk assessment.....compliance assessment. Are these concepts as confusing to you as they are for most IT professionals?


Voltage SecurityWhite Paper: Voltage Secure Stateless Tokenization

Voltage Secure Stateless Tokenization represents a paradigm shift in tokenization. It provides service at a higher performance and with greater security than conventional, database-centric solutions. It is Coalfire's opinion that Voltage Secure Stateless Tokenization, when properly implemented, would effectively promote PCI compliance goals and reduce PCI audit scope for merchants and processors alike.


EVault.comFour Myths of Cloud Backup

Many of the objections IT leaders have to the cloud today have sprung from myths that have reached urban-legend status. Simply put, cloud backup isn't as fraught with peril as some observers believe it to be. Moreover, while bad news, accurate or otherwise, travels fast, good news about cloud backup and recovery has been slower to reach many IT departments.


EVault.comThe Cloud Advantage: Five Ways the Cloud Is Better for Business When Disaster Strikes

Organizations with well-architected, thoroughly tested, and fully documented disaster recovery (DR) plans and solutions were able to bounce back quickly when Superstorm Sandy wreaked havoc onshore. Those who were less prepared had their operations knocked completely offline. Are you ready for a disastrous event like Sandy?


EVault.comCase Study: Kleinfeld Bridal

During our research, EVault seemed to be the cleanest, and it has now proven to be exactly the solution we need.


VoltageUse Case Brief: Ensuring Privacy for PII and PHI in Regulated Industries

Competing encryption offerings we looked at would have required us to hire three or four dedicated administrators to keep everything running smoothly. Voltage SecureMail can be managed with our regular email administrative staff, saving us a lot of time and money.


VoltageSecuremailData Sheet: Voltage SecureMail Cloud Standard

Voltage Security provides compliant email options suitable for all businesses, whether for an accountant working alone or a large multinational financial organization.


VoltageSuccess Story: Envision End-to-End Email Encryption

Envision Pharmaceutical Services (EnvisionRxOptions) is a national, full service pharmacy benefit management (PBM) company. The company provides integrated PBM services, including network-pharmacy claims processing, home delivery (mail-order), benefit-design consultation, drug-utilization review, formulary management, disease management, and drug data analysis services to organizations in a broad range of industry sectors.


VoltageMajor Provider of Insurance, Banking and Travel Products and Services

A leading provider of insurance, banking and travel products and services with over nine million customers in 11 states needed to secure terabytes of customer and corporate data.


Booz Allen HamiltonData-Centric Protection Service Offering

The Cost of a single successful cyber-security attack exploit is Significant and the Cost of Prevention is 1/10 the cost of an exploit.


VoltageUse Case: Data De-Identification

Neutralize data breaches: a new breed of cyber attacks—advanced malware, exploitation networks, and motivated insiders—are stealing sensitive data from vulnerable ecosystems. But companies can neutralize data breaches by rendering the data valueless, de-identifying data through encryption, tokenization, and data masking.


VoltageUse Case: Advancing Medical Research by Sharing Big Data in the US Government

By 2017, Big Data Technology will be the norm for data management.


White PaperEnough is Enough: Fight Back Against Cybercrime

The recently-publicized data breaches are indeed a wake-up call. While the risks have been there all along and baseline control programs have largely been in place, it is now clear that we must do more to protect our customers, our systems and our companies.

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »
Page 1 of 22

  Most Popular | All