Control Objectives for Information and Related Technology Reports

The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
sponsored by TechTarget Security
EBOOK: Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

TechTarget Security

Symantec IT Compliance Solution
sponsored by Symantec Corporation
PRODUCT LITERATURE: Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

Symantec Corporation

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
sponsored by Tripwire, Inc.
WHITE PAPER: To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance.
Posted: 08 Jan 2009 | Published: 08 Jan 2008

Tripwire, Inc.

Top 10 IT security stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 08 Feb 2021 | Published: 09 Jan 2019

TechTarget ComputerWeekly.com

Zero trust: Taking back control of IT security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
Posted: 08 Feb 2021 | Published: 18 Jan 2021

TechTarget ComputerWeekly.com

Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

IT Priorites 2020 - After Covid 19 security goes back to basics
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com