Security audit, compliance and standards

Get tips from the experts on security audits, compliance and standards. Advice is offered on data privacy and theft, audit planning and management, how to work with auditors, and compliance with standards, regulations and guidelines such as PCI DSS, GLBA, HIPPA, SOX, FISMA, ISO 17799 and COBIT.

Security audit, compliance and standards News

Security audit, compliance and standards Get Started

Bring yourself up to speed with our introductory content

  • MD5

    The MD5 (message-digest algorithm) hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message. Continue Reading

  • Data Encryption Standard (DES)

    Data Encryption Standard (DES) is an outdated symmetric key method of data encryption. Continue Reading

  • SSL (secure sockets layer)

    Secure sockets layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet. Continue Reading

Evaluate Security audit, compliance and standards Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Manage Security audit, compliance and standards

Learn to apply best practices and optimize your operations.

Problem Solve Security audit, compliance and standards Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

SearchCloudSecurity
SearchNetworking
SearchCIO
SearchEnterpriseDesktop
SearchCloudComputing
ComputerWeekly.com
Close