• Do I need digital certificates to be sox compliant?

    Dear LS, I'd like to understand to which extend I need digital certificates (PKI) in order to be in compliance with current most important regulations including sox, but also other relevant regulations that might be applicable. This includes topics like WIFI within an Enterprise on a Global scale...

    Mhoddenbagh5 pointsBadges:
  • Is it practical to track all changes to our infrastructure at every level for compliance?

    For compliance reasons, we need to track all changes to our infrastructure at nearly every level (physical, software/patches, and policy changes). Is this practical? This question was asked during the Microsoft System Center live chat on IT Knowledge Exchange in January 2010.

    ITKE346,470 pointsBadges:
  • Who is authorized to give ISO compliance?

    I have a set of test cases for testing various applications and their integration in a Telco. Now I want to have ISO compliance for these Test Case. Who is authorized to give ISO compliance?

    SatyaDas5 pointsBadges:
  • CPOE compliance – General entry vs CPOE

    As a Urology practice we have many older patients with LONG histories and medication lists that have been provided by the referring PCP.  Can a "Non Credentialed" staff member transfer the PCP information into our EHR as a "PRELOAD" prior to appointment date and then allow the patient to review...

    MARYJOCC4SURGERY5 pointsBadges:
  • HIPAA Compliant Server in Amazon EC2

    Hi, I have an instance in Amazon EC2 and need to be HIPAA compliant. I have two doubts, 1. Should I need to do a block level encryption of the database storage. 2. Should I need to encrypt sensitive data before storing in the database. 3. Best database software to handle with the encryption Any...

    Rinshad5 pointsBadges:
  • Single – sign on for ISO 27001 compliance

    Is Single sign-on required for ISO 27001 compliance?

    JonPawsey5 pointsBadges:
  • What do you think of the NSA programs that monitor Internet activity and phone records?

    After news broke of the U.S. National Security Agencies (NSA) access to information from a large segment of Internet traffic (social media and domestic companies), discussions about national security and online privacy issues have reached a new high. What do you think of the NSA programs that...

    Michael Tidmarsh30,715 pointsBadges:
  • Experience with Change Management Software

    Currently evaluating solutions for iSeries, WDSC & Websphere running on Linux on PCs. Down to Aldon & Turnover. Anyone have enough experience with these products to compare strengths & weaknesses in production?

    Formula10 pointsBadges:
  • Information security questions

    Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...

    FrankAZ0 pointsBadges:
  • Checklists for Router, Firewall and Switch security

    I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.

    ISMS130 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • Security Audit

    what form or procedeure would you use for a final security Audit after the Avaya system is installed?

    HubeHube20 pointsBadges:
  • Front-End Reporting Tools for Secure Web Service Application with MS-SQL server-2

    Hi... We are a Cdn Govt agency involved in Satellite Operations with a commercial partner based across the country. We will need to build/buy a small secure web service application for reporting purposes that will require minimal IT expertise to build or maintain, and will deliver maximum...

    Mmosystem0 pointsBadges:
  • Controls

    Is trust a Sarbanes Oxley control?  If not, can you point me to the section of SOX that defines this?

    RDA5 pointsBadges:
  • 508 Compliance

    Is Siebel considered to be 508 Compliant?

    sweiler0015 pointsBadges:
  • Information on IT Auditing

    Where can I get the information on IT auditing from this site? Thank You.

    ss38135 pointsBadges:
  • Block IE or Internet access with group policy

    Is there any way to block Internet access with group policy? I am setting permissions for some of the machines locally to only allow certain users access to the IE executable, but that is a pain in the butt. I have: Win2k3 single domain with 2 DC's approx 50 XP Pro workstations. I'm guessing this...

    TheVyrys0 pointsBadges:
  • What Next?

    We received a notice from NSA saying the specifics on how to handle our encryption program.   The public version has been limited to use of a public key and the software has a built in data integrity algorithm such that any modification of the key disables the use of the software for encryption....

    gailayres15 pointsBadges:
  • PDCA with conflicting laws

    Hello, I'm a student at the University of Advancing Technology (UAT) and this week we've been learning about the Plan, Do, Check, Act methodology for implementing an information management security system. Our reading explains about PDCA and how an organization should use it to obtain an ISO 27001...

    Griff137130 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following