How the Affordable Care Act impacts information security

Information Security Policies, Procedures and Guidelines

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • IT security not valued at many firms, study finds

    A study conducted by research firm IDC found that IT security is seen as an obstacle to business innovation. 

  • When relationships end, so does security

    It is often said that the trusted user is any enterprise's greatest security threat. However, what defenses exist for the threat posed by the people who trusted users trust – girlfriends, boyfriends, spouses and significant others? As Edmund X.... 

  • PING with Shelley Barnes

    As vice president of technology and process at Arizona Tile, Shelley Barnes does not have a CSO to rely on. Barnes has to make the most of the SMB's resources to handle security. 

  • Review: Elemental Security Platform gets a B+

    Elemental Security Platform is a powerful tool for monitoring and enforcing system compliance, and provides effective asset management and asset-centric access controls. 

  • RSA: Accenture executive touts DRM, corporate data lockdown

    Mobile security and digital rights management experts told RSA attendees that enterprises aren't doing enough to crack down on critical data leakage, but emerging DRM offerings may be coming to the rescue. 

  • Data theft prompts firm to lock down, protect network

    After a disgruntled employee made off with several CDs of data, an automotive data reseller realized it had to install better protection at the endpoints. 

  • When 17 days of security is an 'Olympian' task

    There's no bigger target for attackers than the Olympic Games, but security managers thwarted attacks in Turin by having no patience for abnormal users or devices. 

  • Fidelity laptop snafu spotlights need for security policies

    The theft last week of a Fidelity-owned laptop containing sensitive data could have easily been prevented. Are your users paying attention when it comes to laptop security? 

  • Report: Looking for love in all the wrong places

    Data shows people are using company resources to find mates, shop, gamble and chat with friends while on the clock. Is it time for enterprises to confront the new way of doing business? 

  • Cybersecurity policy takes cooperation, trust, experts say

    At the Infosecurity confab, experts explain why sharing information -- even when it's embarrassing -- is vital to securing not only corporations, but also the national infrastructure.