Security audit, compliance and standards

Get tips from the experts on security audits, compliance and standards. Advice is offered on data privacy and theft, audit planning and management, how to work with auditors, and compliance with standards, regulations and guidelines such as PCI DSS, GLBA, HIPPA, SOX, FISMA, ISO 17799 and COBIT.

Security audit, compliance and standards News

Security audit, compliance and standards Get Started

Bring yourself up to speed with our introductory content

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security. Continue Reading

  • RFC 1918

    Request for Comment 1918 (RFC 1918), “Address Allocation for Private Internets,” is the Internet Engineering Task Force (IETF) memorandum on methods of assigning of private IP addresses on TCP/IP networks. Continue Reading

  • What are the top secure data transmission methods?

    Safe information transfer is a must for modern organizations, but not all secure data transmission methods are equal. Explore your secure data transfer options in this tip. Continue Reading

Evaluate Security audit, compliance and standards Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Manage Security audit, compliance and standards

Learn to apply best practices and optimize your operations.

Problem Solve Security audit, compliance and standards Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close