How the Affordable Care Act impacts information security

Information Security Policies, Procedures and Guidelines

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Special considerations for network-based access control

    An excerpt from Chapter 13: Access Control of "Information Security: Design, Implementation, Measurement, and Compliance," by Timothy P. Layton. 

  • Can a security administrator be granted exclusive access to a Windows 2000 security log?

    A security manager can gain exclusive access to Windows 2000 security logs and allow limited access to his or her support staff, but not without complicating the security process. SearchSecurity.com's identity management and access control expert, Jo... 

  • Can laptop users' offline activities be monitored?

    There is a direct solution for enterprises looking to enforce a "no USB devices" policy. SearchSecurity.com's network security expert Michael Chapple provides the answer and explains how an enterprise can monitor laptop users' offline activities. 

  • What are the top five high risk areas in a network operations environment?

    Although continuity plans, encryptions, and change controls are important security concerns within an organization, they are only some of the components that make up a successful security-integrated business program. Expert Shon Harris explains. 

  • Information Security Governance Guide

    This guide provides an introduction to what information security governance and a security program are, and examines how to deploy security policies within any environment. 

  • Automated provisioning quiz answers

     

  • Endpoint security quiz

    Take this five-question quiz to see how much you've learned about endpoint security. 

  • PING with Don Ulsch

    In this Q&A with Information Security magazine, Don Ulsch, technology risk management director for Jefferson Wells, explains why physical and IT security can no longer be treated separately and why security officers must pay attention to employees wh... 

  • Security policies: Don't be an army of one

    Despite the increasing importance of security policies due to regulations like SOX and HIPAA, information security professionals are often left on their own to develop, implement and enforce information security policies and procedures. This seemingl... 

  • SOX Security School Final Exam

    Are you ready for your next SOX audit? Take this Final Exam to see how much you've learned about SOX compliance and whether you need to revisit SOX Security School.