Information Security Research Library

Powered by Bitpipe.com

All Research Sponsored By:SearchSecurity.com & SearchCompliance.com

  • E-Book: Data Protection Plans for Complying with Privacy Laws

    This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!

  • E-Book: New Rules for HIPAA

    Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.

  • E-Book: Data loss prevention strategies, practices and tools

    Data loss prevention strategies, practices and tools are more important than ever. Read this e-book for expert advice on DLP, encryption, risk management and more.

  • NERC: What You Need to Know

    The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this E-Book to find out what responsible entities need to do to comply with the NERC.

  • The Massachusetts Data Protection Law

    Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

  • Governance, Risk, Compliance: Policy Management - Methods and tools

    This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.

  • E-Book: Log Management for Compliance

    Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.