Security: Regulations & Standards


Q&A: Security Policy Best Practices

Communication and monitoring are key, but policies must evolve with changing regulations and new technologies

In Brief

Automating E-Mail Retention, Industry Forms VoIP Security Alliance

Corporate Security Awareness Grows but Funding Lags

Survey shows security managers still face budget battle

In Brief

CSOs concerned by malware and regulations; top IM security predictions; Eudora vulnerability

Case Study: Protecting Hospitals’ Increasingly Networked Systems

HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.

Critics Blast Cybersecurity at Department of Homeland Security

When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?

Top Ten Security Trends for 2005

What's in store for information security

In Brief

Charting spyware growth, identity theft at universities, safer Web browsing

In Brief

Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising

Missing from SOX Compliance Efforts: IM Audits, Archives

With the November 15 deadline looming for many organizations, many companies still don’t have a plan for auditing and archiving instant messages.

Software Vaults Protect Sensitive Information

Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more

Best Practices: Security Budgeting for 2005

IT must cope with under-funded regulations, more CIO leeway

Best Practices: IM Monitoring

Under pressure from such regulations as HIPAA, the Gramm-Leach-Bliley Act, and Sarbanes-Oxley, companies increasingly have to account for their corporate instant messaging policies. Yet many organizations don’t have rules for IM use.

In Brief

Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks

Digital Certificates Get Pentagon, Regulatory Boost

Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.

Five Steps to Enforcing Your Endpoint Security

Your security policy has to have teeth. Here's how to enforce your endpoint security policy.

Briefs

More XP SP2 woes, fraud awareness survey, Can-Spam's failure

Digital Certificates Secure Web Services, Mobile Communications

Public key infrastructure isn't dead yet.

Case Study: Choosing Outside Help to Meet Security Regulations

Finding just the right provider can be tricky. How one company made its decision.