Government Regulations Reports

E-Discovery Cloud Considerations
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.
Posted: 04 Dec 2012 | Published: 04 Dec 2012

Symantec Corporation

Cloud Compliance Technical Guide
sponsored by TechTarget Security
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

TechTarget Security

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

Absolute

Information Security Threats: Building Risk Resilience
sponsored by TechTarget Security
EGUIDE: Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

TechTarget Security

The State of Privacy and Data Security Compliance
sponsored by Sophos
ANALYST REPORT: The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out.
Posted: 25 Jun 2010 | Published: 30 Nov 2009

Sophos

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Final countdown to ICD-10: Prepare for a successful transition
sponsored by TechTarget Health IT
EZINE: After a one-year delay, the ICD-10 deadline goes into effect in the U.S. on October 1, 2015. This edition of Pulse examines the final stages of preparation for ICD-10, including tips on managing revenue cycle, and 3 key ways to make the transition easier for everyone in your organization.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

TechTarget Health IT

Revamping and optimizing your SAP GRC strategy
sponsored by Security Weaver
EBOOK: GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Healthcare Networking Classroom
sponsored by TechTarget Health IT
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

TechTarget Health IT

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by TechTarget Security
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

TechTarget Security