RESEARCH CONTENT:
This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
VIRTUAL ENVIRONMENT:
Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
WHITE PAPER:
This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.
EGUIDE:
While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.
WHITE PAPER:
This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
WEBCAST:
This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
EZINE:
In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
WHITE PAPER:
Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
WEBCAST:
In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.