IT Security Audits Reports

The Best PCI Audit of Your Life
sponsored by Lumension
WHITE PAPER: This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
Posted: 13 Aug 2009 | Published: 13 Aug 2009

Lumension

Resolve Web Security Issues with Industry Experts' Advice
sponsored by Veracode, Inc.
EGUIDE: Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

The Event Data Warehouse- Strategies for Improving Business Performance
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions.
Posted: 18 Jul 2011 | Published: 18 Jul 2011

Hexis Cyber Solutions Inc

PCI DSS Simplified: What You Need to Know
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013

AT&T Cybersecurity

SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization
sponsored by IBM
EGUIDE: Defining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

Information Security Magazine, May 2009: Automating Compliance
sponsored by Information Security Magazine
EZINE: This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009

Information Security Magazine

E-Guide: Database Tools for Auditing and Forensics
sponsored by TechTarget Security
EGUIDE: This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

TechTarget Security