Regulatory Compliance Software Reports

Data protection rises up business agenda
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 08 Feb 2021 | Published: 17 Dec 2018

TechTarget ComputerWeekly.com

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

Rules, risk and the potential for profit in the world of Basel III
sponsored by IBM
WHITE PAPER: Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III
Posted: 30 Sep 2013 | Published: 30 Sep 2013

IBM

May Information Security Magazine
sponsored by TechTarget Security
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

TechTarget Security

Facing up to emerging technology: Risks and benefits
sponsored by TechTarget CIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

TechTarget CIO

Case Study: WebEx - Securing Web Collaboration
sponsored by Qualys
CASE STUDY: Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.
Posted: 18 May 2010 | Published: 18 May 2010

Qualys

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

TechTarget Security

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

Technology Tools and Policies for Corporate Compliance
sponsored by TechTarget Security
EBOOK: In this SearchCompliance e-book, examine the technology tools and policies organizations are implementing as part of a wide-ranging corporate compliance program.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

TechTarget Security