We describe what to expect from an audit, how to ensure your organization is prepared, examples of common HIPAA violations, prevention methods, and real world solutions that work. Avoid the Common HIPAA Compliance Failures
We provide a checklist of critical questions to ask, what information you should (and shouldn’t) provide, strategic and tactical recommendations to look for after the pen test. Read this Penetration Testing Whitepaper before you hire your next Pen Test vendor.
As broken protocols, cloud, mobility, and key management woes add to IT’s load, the best bet is to get self-sufficient.
Remember the days of strolling into a client’s building and meeting him just outside his office for lunch? Try that now and you’re likely to be tackled by a security team maintained by building management. No matter how good your building’s security team, your organization’s data is your responsibility. Given new attack vectors and mobility work patterns, now is a great time to review your physical controls.
Breached partners, mobility, SaaS, consumerization. If you don’t know exactly who’s doing what on your network, you’re cruising for data loss.
While virtualization changes the way organizations use servers, provision applications and configure networks, it doesn’t change bedrock security principles. In fact, virtualization makes those principles more necessary than ever. This report outlines four steps, or processes, that organizations can take to manage the risks inherent in a virtualization environment.
Most IT shops are outsourcing the actual development of mobile apps. But IT leaders still must set a clear strategy for how they’ll develop, deploy, and support these apps.
In this report, we’ll examine survey results and discuss how to advance on this path and reveal how to get an internal security-as-a-service program off the ground, with lessons that are applicable to other areas of IT.
A look back at one of the industry’s most complex attacks–and the lessons it teaches.
Spinning up VMs may well be too easy for our own good. Fortunately, keeping virtual servers safe isn’t as difficult as some believe. In this whitepaper we explain our virtualization security strategy. Download the Virtualization Security Report
Security professionals often feel that executives don’t prioritize information security and risk management, in terms of attention, budgets or both. But the 1,084 security pros responding to our 2011 Strategic Security Survey suggest that may be changing.