How the Affordable Care Act impacts information security

Information Security Policies, Procedures and Guidelines

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Can companies control their affiliate-based adware?

    Companies often advertise unintentionally with adware. In this SearchSecurity.com Q&A, Ed Skoudis explains some best practices that can keep a company's Internet-marketing strategy spyware-free. 

  • Best practices for implementing a retention policy

    In this SearchSecurity.com Q&A, security management expert Mike Rothman discusses best practices for implementing a successful retention policy within an enterprise. 

  • M&A: Merging network security policies

    Company mergers often call for the consolidation of two different network policies. But before making any final decisions on technology, the staff members of both organizations need to be on the same page. In this tip, contributor Mike Chapple explai... 

  • defense in depth

    Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise... (Continued) 

  • Can watching online videos present enterprise security risks?

    In this SearchSecurity.com Q&A, security expert Mike Rothman unveils what security risks, if any, are presented by Internet video and radio. 

  • How secure are document scanners and other 'scan to email' appliances?

    Copiers and document scanners have always posed challenges for information security teams. In this SearchSecurity.com Q&A, Michael Cobb reveals how the right policies can control the use (and abuse) of these devices. 

  • security policy

    In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. 

  • Will disabling thumb drives affect keyboard and mouse functions?

    Shutting down USB drives altogether may be a wise decision for your enterprise, but what does that mean for systems that rely exclusively on USB for the keyboard and mouse? Security threat expert Ed Skoudis explains. 

  • How can a CSO take ownership of a security program?

    CSOs may be in charge of their security programs, but they don't work alone. In this SearchSecurity.com Q&A, security management expert Mike Rothman describes how protecting data and systems is a collaborative effort. 

  • Can one catalog map to multiple compliance standards?

    Can one sole resource be used to map security controls to a mass of different compliance regulations? In this SearchSecurity.com Q&A, Mike Rothman discusses the possibilities.