How the Affordable Care Act impacts information security

Information Security Policies, Procedures and Guidelines

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • defense in depth

    Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise... (Continued) 

  • Can watching online videos present enterprise security risks?

    In this SearchSecurity.com Q&A, security expert Mike Rothman unveils what security risks, if any, are presented by Internet video and radio. 

  • How secure are document scanners and other 'scan to email' appliances?

    Copiers and document scanners have always posed challenges for information security teams. In this SearchSecurity.com Q&A, Michael Cobb reveals how the right policies can control the use (and abuse) of these devices. 

  • security policy

    In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. 

  • Will disabling thumb drives affect keyboard and mouse functions?

    Shutting down USB drives altogether may be a wise decision for your enterprise, but what does that mean for systems that rely exclusively on USB for the keyboard and mouse? Security threat expert Ed Skoudis explains. 

  • How can a CSO take ownership of a security program?

    CSOs may be in charge of their security programs, but they don't work alone. In this SearchSecurity.com Q&A, security management expert Mike Rothman describes how protecting data and systems is a collaborative effort. 

  • Can one catalog map to multiple compliance standards?

    Can one sole resource be used to map security controls to a mass of different compliance regulations? In this SearchSecurity.com Q&A, Mike Rothman discusses the possibilities. 

  • PING with Shelley Barnes

    As vice president of technology and process at Arizona Tile, Shelley Barnes does not have a CSO to rely on. Barnes has to make the most of the SMB's resources to handle security. 

  • Are USB storage devices a serious enterprise risk?

    USB drives are common gifts at conferences and trade shows, but how much of a danger are they to your enterprise's network security? In this expert Q&A, Michael Cobb explains the risks of these storage devices and how to control their use. 

  • Review: Elemental Security Platform gets a B+

    Elemental Security Platform is a powerful tool for monitoring and enforcing system compliance, and provides effective asset management and asset-centric access controls.