• IT sites SOX as reason we can not diag. Dropped packet problem in setting up IP Phone system.

    We have wasted 20 hours proving to another IT company that the issues are in their firewall.  They will not let us even see what they are doing...quoting SOX as the reason.  We have finally told the customer that unless we can not see their configuration, they will need to purchase another...

    TNTGRP15 pointsBadges:
  • Power Point 2003 vs. 2007 PCI DSS Compliance

    Would migrating to Power Point Viewer 2007 change PCI DSS compliance in any way if all patches were applied to 2007?  i.e., does the newer version bring anything like ActiveX into the picture?

    mperry2915 pointsBadges:
  • Data Protection Act [UK]

    Hi, Can anyone point me in the direction of an up-to-date summary [in layman's terms] of this act? Thanks in advance

    Mattaux0 pointsBadges:
  • Adding NICs to my machine to run VMs from my Windows 7 computer

    If I want to run multiple VMs from my Windows 7 computer, I will need 6 NICs. How can I add 6 NICs to my machine? Are there ethernet banks or a single PCI card with lots of ports?

    Troubleshooter24755 pointsBadges:
  • PCI Simple Communications Controller

    What is the PCI Simple Communications Controller used for?

    Ericjaxn5 pointsBadges:
  • AS400 System Value Settings Help?

    In our AS400 environment there are several individuals who has *SECADM and *ALLOBJ authority due to some reason, we are trying to investigate few incidents of system value settings which were changed but we don't who did it, any help or workaround which can lead us to the right path?

    ZahoorHyder5 pointsBadges:
  • Application Access Control Management

    Is there an enterprise wide software management program that can manage access to our web-based applications, vendor specific programs located thru out the entire company, and our MS applications, including MS Outlook? In other words, we would like to control all of the various software programs...

    NBf9910 pointsBadges:
  • Inbound traffic is coming from router IP, not internet IP. Why?

    Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend's IP address, but coming from...

    Robert5795 pointsBadges:
  • SAS-70 certification

    I have a quick question regarding SAS-70 Certification. If my company completes a SAS-70 audit, does that automatically make us certified or are there additional steps for certification? also when we get certified how long does that certification last before it will need to be renewed? any...

    JohnDough5 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Checking TCP Servers

    I need to code a program that will confirm that certain TCP Servers such as TFTP are NOT started per PCI requirements as they are insecure

    JerryBushika5 pointsBadges:
  • Open IT Forum: How do you raise awareness for security compliance in the enterprise?

    We've gotten your opinions on network security from the hardware and software side, but now we want to know what you're doing for compliance. From what your compliance policies are to the creative ways you raise awareness about those policies, share your stories and you might get 100 knowledge...

    MelanieYarbrough6,345 pointsBadges:
  • How to begin attempting to build and sustain security for our information assets?

    I recently learned about SKiP, Security Knowledge in Practice, in one of my classes at UAT and I am very intrigued by it.  I did not realize that the problem-based approach was the common.  I guess that is one of the great advantages of SKiP, being a process-based approach to organize and...

    JJUAT5 pointsBadges:
  • Changing proxy rights for select users

    I work in a company that has a proxy who can limit the people acces into some sites,my question is...what changes can i do to  the proxy server to accept these sites for one or more users?(usual changes into one basic proxy server)

    Razvan19875 pointsBadges:
  • Comprehensive distributed software management policy and standards

    Could anyone share or provide input on a comprehensive distributed software management policy and standards that prohibit non-developer access to source code and prohibit developers from creating executable code and placing it in migration folders (which then can be moved to test and production)?

    Debby10 pointsBadges:
  • Power Meter and Processor overheating

    I am facing a strange problem with my win 2000 server pc(256mb RAM, P4, 40gb hdd) as it automatically restarts when I start the computer. Yesterday it completely shut down before showing me the desktop and when I pressed the power button the initial screen came up showing message "the processor...

    BinooDas123410 pointsBadges:
  • Invalid login attempts in AS/400 SOX

    Hi, for SOX auditing I need to provide Information Security with a daily list of failed login attempts (any server type) and actual logins for a list of sensitive accounts. Straightforward stuff on other platforms but I can't see how it can be done on i5/OS. I have seen a few references to doing...

    londonunixguy5 pointsBadges:
  • SAS type 2 audits

    Hello If a customer don't wants to execute the SAS70 type 2 audit - is there any other compliance standards that you can choose from ? That is to get the same compliance documentation/status but not execute the SAS70 type 2 audit? Is there any light version of the SAS70 standards?

    OddLeth5 pointsBadges:
  • iSeries Net Time

    We are going through a PCI audit and it was suggested that we implement NET Time on the AS400. How do I do that?

    CharlieBrowne41,430 pointsBadges:
  • Creating abuse and postmaster exchange account

    How do I create an abuse and a postmaster exchange account to be in compliance? I am using Exchange 2003 and Outlook 2007.

    NewnanIT1,110 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following