Government Regulations Reports

CW Europe – June 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.
Posted: 08 Feb 2021 | Published: 08 Jun 2017

TechTarget ComputerWeekly.com

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by TechTarget Security
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

TechTarget Security

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
PODCAST: What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

Becoming Value-driven: Focusing on What Matters Most
sponsored by IBM
WHITE PAPER: This white paper provides insight into the six key areas essential for becoming a value-driven organization. Discover how to gain the visibility and control essential to meet and exceed customer needs.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

IBM

Information Security Threats: Building Risk Resilience
sponsored by TechTarget Security
EGUIDE: Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

TechTarget Security

Records Management Strategies to Maintain Regulatory Compliance
sponsored by TechTarget Security
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

TechTarget Security

The Deloitte Consumer Review: A more secure customer
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

TechTarget ComputerWeekly.com

Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10
sponsored by BlackBerry
WEBCAST: This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013

BlackBerry

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware