Information security management system

Results: 3115



#Item
621Downtime / Database security / Information technology / Project management / Knowledge / System administration / Patch / Software maintenance

Virtual Patching and Database Security: An Effective Compensating Control Patching promptly is part of highly effective approaches to managing vulnerabilities, but patching is not always practical or even possible — wh

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:00
622Data security / Splunk / Information technology management / Application firewall / Application security / Cloud computing / Security / XML firewall / Computer security / Computing / System administration

Press release Boulogne-Billancourt, June 21, 2012 DenyAll Application Security Dashboard, a comprehensive, Splunk-based, free reporting application DenyAll announces the availability of a Splunk application dedicated to

Add to Reading List

Source URL: www.denyall.com

Language: English - Date: 2015-02-25 04:56:13
623Mobile technology / GPS / Earthquakes in Japan / Global Positioning System / Disaster / Tōhoku earthquake and tsunami / Information security / Assisted GPS / Emergency management / Technology / Satellite navigation systems / Crime prevention

3-2 Development of Cellular Phone Application for Safety/Disaster Information Collection and Transmission; “Easy-Reporter” JEONG Byeong-pyo, TAKIZAWA Osamu, ENDO Makoto, and ZAMA Shinsaku We have developed a cellula

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:02:43
624Integrity / Positive psychology / Sport / Whistleblower / Information security management system / Ethics / Business ethics / Evaluation

Sports integrity Integrity has never been higher on the global sporting agenda than it is right now. Doping, match-fixing and governance scandals have touched upon every country and every sport, damaging its perception a

Add to Reading List

Source URL: www.hilldickinson.com

Language: English - Date: 2014-08-13 08:40:34
625Internal control / Business / Data / Information / Auditing / Internal audit / IBM Information Management System

Extra Security Gisella Tan, aged 7 To Gisella, security is being surrounded by everything you need at home. What’s even better is the added comfort of a very secure chair with eight legs to sit on when you want to sett

Add to Reading List

Source URL: www.mpfa.org.hk

Language: English - Date: 2013-07-29 21:27:55
626Portal software / Computing / Information technology management / Host Based Security System / McAfee VirusScan / McAfee / Software / Microsoft SharePoint

Data Sheet McAfee Solution Services Packaged Implementation Offerings Essential services for McAfee® Security for Microsoft SharePoint Intelligent security by design: Expert advice to help you realize the full value of

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:22
627Risk / Crime prevention / National security / Safety Integrity Level / IEC 61511 / Functional Safety / Safety instrumented system / IEC 61508 / Information security management system / Security / Safety / Prevention

Recommendations to align safety and security for industrial automation control systems ISA99 WG7 TG1 Dennis Holstein (US), Virgil Hammond (US), Joe Weiss (US), Ajay Mishra (US), Andrew Ginter (US), Robert Abercrombie (US

Add to Reading List

Source URL: isa99.isa.org

Language: English - Date: 2015-03-07 11:37:44
628Data remanence / Disk formatting / Drive letter assignment / Information technology management / System software / Blancco / Data erasure / Data security / Computing / Gutmann method

ZeroData™ computer reliability solutions Wipe all data from a hard drive...defeat the most sophisticated software or hardware recovery tools...permanently

Add to Reading List

Source URL: www.eurosoft-uk.com

Language: English - Date: 2015-03-11 07:53:15
629Business / ISO 14000 / Environmental management system / Management system / Environmental resources management / Continual improvement process / Information security management system / Emergency management / Audit / Environmental economics / Environment / Earth

business + strategy How to up the EMS ante Implement these tips and your

Add to Reading List

Source URL: www.wme.com.au

Language: English - Date: 2011-05-19 01:39:33
630Security / Business / Regulatory compliance / Internal audit / Information security management system / Compliance and ethics program / Governance /  risk management /  and compliance / Auditing / Risk / Data security

National Occupational Standards Compliance NOTES ABOUT NATIONAL OCCUPATIONAL STANDARDS What are National Occupational Standards, and why should you use them?

Add to Reading List

Source URL: www.int-comp.org

Language: English - Date: 2014-11-28 05:04:16
UPDATE