New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Security audit, compliance and standards News
December 13, 2017
A team of security researchers discovered many vendors' TLS implementations are vulnerable to the Bleichenbacher oracle attack, which was first discovered 19 years ago.
September 06, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss new research from Verizon on payment card security and the effectiveness of PCI DSS compliance for enterprises.
September 01, 2017
News roundup: More than half of enterprises are in compliance with PCI DSS, according to a Verizon report. Plus, Turla is on the attack again with a new campaign, and more.
June 02, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss GDPR compliance and how the EU law will affect enterprise data privacy and security across the globe.
Security audit, compliance and standards Get Started
Bring yourself up to speed with our introductory content
Hospitals that face an influx of medical imaging data can benefit from a hybrid cloud model to store data and enable disaster recovery services. Continue Reading
Administrators who wrestle with compliance tasks in Office 365 and Azure workloads might find some relief with Microsoft's dashboard platform, which automates part of the process. Continue Reading
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. Continue Reading
Evaluate Security audit, compliance and standards Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Compliance with the European Union's General Data Protection Regulation isn't optional. Noncompliance could be costly and possibly disastrous. Find out what you need to know. Continue Reading
Xerox CISO Alissa Johnson says U.S. companies will be forced to reconsider their information protection strategies as consumers' data privacy protection expectations evolve. Continue Reading
Object-based storage systems can provide the scalability needed to meet organizations' increasing unstructured data storage requirements. Learn how to pick the right platform. Continue Reading
Manage Security audit, compliance and standards
Learn to apply best practices and optimize your operations.
OWASP released a draft of new guidelines for creating secure code within embedded software. Expert Judith Myerson discusses best practices, pitfalls to avoid and auditing tools. Continue Reading
The EU's General Data Protection Regulation legislation goes into effect in May 2018. Don't assume your European business is too insignificant to need to comply. Continue Reading
As the governance, risk and compliance market changes, organizations can pass on the full-blown GRC suite and instead choose a tool that targets a specific issue. Continue Reading
Problem Solve Security audit, compliance and standards Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Consider security compliance regulations for your industry as a starting point and a guide for planning your specific approach to enterprise endpoint protection. Continue Reading
While GRC suites offer the promise of achieving governance, risk and compliance, their use can be problematic for companies. Here's a deeper look at the issues. Continue Reading
Third-party compliance is a necessary part of securing your organization's data. Expert Matthew Pascucci discusses what to do if you suspect a business partner isn't compliant. Continue Reading