Email Alerts
-
Survey results highlight the importance of HIPAA compliance training
The Vice President of Policy and Government Relations for the American Health Information Management Association speaks out on the importance of compliance training. Executive Briefing
-
A Business Guide to Information Security: Threats and Compliance
In this excerpt from Chapter 1 of A Business Guide to Information Security, author Alan Calder identifies six future risks to information security and explains how they will affect individuals and organizations. Book Chapter
-
Ensure that legal responsibilities are clear -- Especially when trouble strikes
Excerpt from Chapter 15 of Information Nation Warrior: Information Management Compliance Boot Camp. Book Chapter
-
Passive fingerprinting: Applications and prevention
In this excerpt from the book Silence on the Wire, author Michal Zalewski discusses both malicious and beneficial uses for passive fingerprinting, and how to prevent successful passive fingerprinting on your network. Book Chapter
-
ID theft and national security
Check out what some ITKnowledge Exchange members had to say about this controversial issue. Security Speak-Out
-
Do you speak geek: Respecting the letter of the law
Test your knowledge of security laws and regulations. Quiz
-
Quiz: Compliance
Test your knowledge of legislation and standards. Quiz
-
How to avoid federal Wiretap Act issues with a honeypot network security system
Hackers have rights, too. How can you deploy honeypots without running afoul of the law? Feature
-
Achieving compliance with the California SB 1386 privacy law
California's new SB 1386 privacy law is full of ambiguity, but if you do business there, you'd better get your guard up. Feature
Security Management Strategies for the CIO