• Information on IT Auditing

    Where can I get the information on IT auditing from this site? Thank You.

    ss38135 pointsBadges:
  • Block IE or Internet access with group policy

    Is there any way to block Internet access with group policy? I am setting permissions for some of the machines locally to only allow certain users access to the IE executable, but that is a pain in the butt. I have: Win2k3 single domain with 2 DC's approx 50 XP Pro workstations. I'm guessing this...

    TheVyrys0 pointsBadges:
  • What Next?

    We received a notice from NSA saying the specifics on how to handle our encryption program.   The public version has been limited to use of a public key and the software has a built in data integrity algorithm such that any modification of the key disables the use of the software for encryption....

    gailayres15 pointsBadges:
  • PDCA with conflicting laws

    Hello, I'm a student at the University of Advancing Technology (UAT) and this week we've been learning about the Plan, Do, Check, Act methodology for implementing an information management security system. Our reading explains about PDCA and how an organization should use it to obtain an ISO 27001...

    Griff137130 pointsBadges:
  • Governance of IT Assets

    I'm looking for example templates that could be used to provide an IT Governance Board with the assurance that it's IT assets are being managed appropriately and not exposed to any unnecessary risks.

    MarkCarlyle5 pointsBadges:
  • EU security directive

    Where can I find implementation details for complying with EU directive 95/46/ec?

    InfPB5 pointsBadges:
  • Regulations that apply to ILECs

    I am researching whether my county can create its own ILEC (Independent Local Exchange Carrier). I am clear on the state laws that apply, but am curious as to what federal regulations apply to ILEC and what steps would need to be taken on the federal level. I know the FCC regulates ILECs, but that...

    wwelsh5 pointsBadges:
  • Compliance

    Within the GRC cycle, how can IT security compliance be best described?

    gbwilson10 pointsBadges:
  • EXCED 13

    Which brand is EXCEED 13 , Hummingbird or Open Text

    OTAZKY15 pointsBadges:
  • Windows Foundation Server 2008 R2 License and Domain issues

    We have joined 2 Foundation servers to an existing domain as members in a Forest to a Server 2008 R2 Standard DC as the parent.Regularly on startup we get a message "Check for Licensing Compliance is Incomplete".I need to know how serious this error is? and are we going to experience problems if...

    GazzaBot10 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Which encryption algorithm is the most recommended by the PCI standard?

    Does anyone know if AKA ver 2 protocol is PCI compliance?

    Keren5 pointsBadges:
  • Agile SDLC SOX Controls

    We are implementing Agile SDLC in our company. Has anybody identified Agile SDLC controls that are tested as part of their SOX complinance program? Would appreciate any examples of controls that you can offer

    Rcneville5 pointsBadges:
  • PCI Compliance for hosted merchant systems

    We contract with an outside merchant who hosts a software system that is accessable through a secure login on select, internal personal computers. We contract as agents of that merchant to operate their system as a point of sale for services. Payment for those services can be by credit card and CC...

    CPO5 pointsBadges:
  • Active Dir. Web Based Password Reset Tool?

    We run a native 2003 Active Directory. We have many remote users who have an AD account (without an Exchange account). Quite often we get emailed from users who are requesting password resets, or account unlocks (since we have a 5-try account lockout policy in effect on the domain). Obviously,...

    GregNottage0 pointsBadges:
  • virus malware spyware

    I want to how to conduct a risk assessment to protect our pcs, networks

    M20085 pointsBadges:
  • checklist for moving datacenter

    Hello. Our company have a plan to move datacenter in a month and my boss ordered me to make out the plan for it. But I don't know how to do it, especially I have no idea about what I should check for moving datacenter. Help me! How can I get the process, checklist.... for moving datacenter?

    Chosang10 pointsBadges:
  • PCI compliance 1.4(b) on personal firewalls

    Requirement 1.4(b) asks if personal firewall software is not alterable by employee-owned computer users. If we allow employees to alter their personal firewall software settings, what other compensating controls could we implement in order to meet satisfy the objective of this requirement?

    Eb100255 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following