Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

security regulation

Results 26 - 50 of 112Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Nov 21, 2011
With increased visibility into computers on and off their network, Allina Hospitals was able to optimize security and comply with regulations.
Tags : 
auditing, audit, accuracy, allina hospitials, allina, optimize security, security, regulations
    
Absolute Software
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : 
byod, device discovery, data privacy, data security, it security, security, it management
    
Kaspersky Lab
Published By: Mimecast     Published Date: Jan 19, 2018
The importance of information security and data protection is growing by the day for organizations. This is due to an evolving threat landscape and a higher adoption of internet dependent services, which, in the process of creating new opportunities, also lead to more vulnerabilities. As a consequence, national and international regulations are also changing according to the new challenges, calling for better preparedness. The new BCI Information Security Report 2017 sponsored by Mimecast looks to benchmark how organizations handle sensitive data and how resilient organizations are when it comes to data protection.
Tags : 
bci information, security and data protection, security report, data protection
    
Mimecast
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: Protect your data and reputation while meeting clients’ cybersecurity expectations Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing Comply with regulations and ethics codes
Tags : 
accounting, risk reduction, encryption, compliance, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
The General Data Protection Regulation(GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.
Tags : 
data security, data protection, risk reduction, security regulation, data breach
    
Citrix ShareFile
Published By: Amazon Web Services EMEA     Published Date: Sep 24, 2018
Under GDPR, we all have new obligations to improve the security and privacy of personal data at our organisations. With the new Amazon Web Services eBook, GDPR: The Basics, you’ll gain a fundamental understanding of this new EU regulation. In this eBook, you will learn about: • How to view GDPR as an opportunity, and how you can build on it • Article 32 – a core part of the security principle • Data subject rights • Key players and responsibilities • And much more
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: SailPoint     Published Date: Feb 08, 2011
Learn the three best practices IT should follow to ensure that business managers actively and effectively participate in identity management compliance and security processes.
Tags : 
sailpoint, business management, identity management, compliance, security, government regulation
    
SailPoint
Published By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
    
Mimecast
Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack
    
BAE Systems
Published By: IBM     Published Date: Nov 10, 2016
Today’s Digital Business needs a strategy for business content – one that spans the creation, capture, activation and analysis of it – which assures security, compliance with regulations, and minimizes risk. This session will confront content chaos and its impact on business agility. We will share stories from IBM customers who are using business content solutions to deliver on the promise of the Digital Business today. Many are using ECM Centers of Competency to bring together all stakeholders in the business to create a unified vision for information management across all departments and all forms of data and content, whether on-premises, mobile, or in the cloud.
Tags : 
ibm, analytics, ecm, digital business, enterprise applications
    
IBM
Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv
Published By: Cybric     Published Date: Oct 30, 2017
How a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Whether you’ve over-invested in security tools, under-invested, don’t know the extent of your security capabilities or you’re facing new regulations that require you to demonstrate and continually maintain compliance — there is a path forward. To understand and optimize what you have in place, as well as gaps you may have, develop a security rationalization process to calculate the return on your security investments. Read this paper to learn the five steps needed to get started.
Tags : 
cybersecurity, cyber security, ciso, security visibility, security assurance, security resilience, application security tools, appsec
    
Cybric
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper examines how states like Massachusetts have implemented one of the most stringent requirements for protecting consumer data and how organizations of all sizes can meet the privacy requirements with simple, scalable encryption technologies.
Tags : 
consumer privacy regulation, globalsign, biowrap, encryption solutions, wisp, compliance, personal information, security breach
    
Globalsign Inc.
Published By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : 
gdpr, email, personal data, security, data protection
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: • Important cyber security risks • The impact of a data breach to your organization • Key regulations around the globe
Tags : 
healthcare, data protection, patient medical data
    
Mimecast
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications, enterprise applications
    
Oracle
Published By: Intralinks     Published Date: May 29, 2013
Ensuring the security of confidential, sensitive information is an essential element of enterprise Security and Governance, Risk Management and Compliance programs. Regulations, such as the HIPAA, FDA, and SOX, place significant requirements on organizations for securely sharing sensitive data such as confidential personally identifiable information (PII) and personal health information (PHI).
Tags : 
security, sensitive information, sharing, mobile file sharing, solutions, confidential, software development
    
Intralinks
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn more about AT&T Security Event & Threat Analysis Service, a full service security monitoring, mitigation and compliance solution.
Tags : 
at&t, security event, threat analysis, security monitoring, compliance, regulations, security tools, threat identification
    
AT&T
Published By: Tenable     Published Date: Feb 07, 2018
While multinational companies can likely meet some of the GDPR requirements right now, most will find the path to full compliance requires many changes to business-as-usual security practices. Read this paper to learn how you should be preparing your information security program for compliance with the GDPR. Written for InfoSec leaders, the paper includes: - A glossary outlining key concepts of the Regulation - 13 essential steps you should take to help ensure GDPR compliance - A summary of infosec considerations posed by the EU Data Protection Directive 95/46/EC and GDPRD
Tags : 
security frameworks, compliance, iso 27000, cis controls, nist, pci, security regulation
    
Tenable
Published By: Tenable     Published Date: Feb 07, 2018
"Basing your infosec program on an established security framework gives you the controls, KPIs and vocabulary needed for building – and operating – a structured, scalable, and effective practice. For insights into how this works in the real world, download and read Economic, Operational and Strategic Benefits of Security Framework Adoption, a collection of brief essays from 28 global infosec leaders. Topics covered include: - Meeting customer and partner requirements - Improving security practices - Enabling effective communications with corporate leaders - Addressing global compliance challenges - Adapting the framework to fit your needs"
Tags : 
security frameworks, gdpr, general data protection regulation, compliance, iso 27000, cis controls, nist, cyber
    
Tenable
Published By: HP     Published Date: Jul 29, 2008
The data residing on your storage systems and media, data-at-rest, presents serious security concerns. Regulations and various mandates around the world are putting the burden on companies and government entities to protect the private information they store. Increasingly, companies are being required to publicly disclose breaches that put individuals private data at risk, be it a customer, employee, shareholder, partner, or other stakeholder.
Tags : 
data security, database security, securing data, customer data, consumer data, pci, cardholder data, mission critical
    
HP
Published By: Entrust Datacard     Published Date: Jul 09, 2019
Revised Payment Services Directive (PSD2) is the European Commission (EC) and the European Banking Authority’s (EBA) newest regulatory directive to ensure customer security in the payments space, is upon us. In order to comply with these new regulations, you first need to ensure you have a good understanding of what they are, why they exist and how they will affect your organization’s business strategy moving forward. Don’t let the potential business impact of PSD2 hang over your head. PSD2 can actually be a catalyst for your digital= transformation. With the right solution, you can provide a more secure, better user experience for your customers. If you are able to capitalize on PSD2 and implement a forward-thinking strategy, you can ultimately differentiate your brand from emerging competition — like neobanks, fintechs and wallet providers — and retain customer trust and loyalty.
Tags : 
    
Entrust Datacard
Published By: McAfee     Published Date: Mar 08, 2013
Databases don’t take the day off. Neither do we. McAfee security experts remain focused on keeping your sensitive information safe and available while helping your company ensure compliance with internal policies and industry regulations.
Tags : 
database security, database compliance, database virtual patching, database breach, application control, legacy databases
    
McAfee
Published By: Entrust Datacard     Published Date: Jul 08, 2019
Revised Payment Services Directive (PSD2) is the European Commission (EC) and the European Banking Authority’s (EBA) newest regulatory directive to ensure customer security in the payments space, is upon us. In order to comply with these new regulations, you first need to ensure you have a good understanding of what they are, why they exist and how they will affect your organization’s business strategy moving forward. Don’t let the potential business impact of PSD2 hang over your head. PSD2 can actually be a catalyst for your digital transformation. With the right solution, you can provide a more secure, better user experience for your customers. If you are able to capitalize on PSD2 and implement a forward-thinking strategy, you can ultimately differentiate your brand from emerging competition — like neobanks, fintechs and wallet providers — and retain customer trust and loyalty.
Tags : 
    
Entrust Datacard
Start   Previous    1 2 3 4 5    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.