Tired of onerous compliance regulations? Try descoping

IT Security Audits

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Where hard drives go to die, or do they?

    A number of enterprises are using asset disposal firms to ensure sensitive corporate data is destroyed, but the process is hardly foolproof. In fact, a convicted felon could have his hands on your data right now. 

  • Top U.S. universities failing in online privacy

    With the University of Texas the latest to admit it's been hacked, a new national survey shows many of the nation's foremost schools aren't making the grade when it comes to online privacy. 

  • Microsoft to close security updates on old Windows

    As of mid-July, Microsoft will no longer provide security updates for Windows 98 and Windows Me. Experts say the decision is likely long overdue. 

  • Opinion: Military security legacy is one of innovation, integrity

    In response to a recent column criticizing corporate use of military security guidelines, infosec pro Norman Beznoska Jr. says corporate America has borrowed much of its technology from the armed forces, and could still stand to learn a thing or two.... 

  • Poor government security makes industry wary

    The annual review of government security practices shows several agencies still aren't improving. Experts are worried it could harm Homeland Security's ability to work with the private sector to stop cyberterrorism. 

  • For CISOs, fitting in was never so hard

    As more organizations move their security officers out of IT, it may become easier for CISOs to succeed, but harder for other security pros to avoid a career dead-end. 

  • Risk management for dummies

    Stop making risk management your problem. Taking control of risk management means laying out the options and getting the business to accept responsibility. 

  • Cheat sheet: 10 ways to prep for auditors

    There are 10 ways to prepare for those auditors knocking at your door -- and avoid wasting time and money. 

  • Report: IT shops lax about logging

    New research suggests enterprises are taking a half-baked approach to log management, compromising security in the process. 

  • Compliance drives security investments

    Federal regulations help boost some organizations' security efforts, but they shouldn't be the sole driver of security.