Security risk

Results: 17047



#Item
551Computing / Prevention / Security / Cryptography / Crime prevention / Information governance / National security / Cloud computing / Data center / Information security / Risk management / Business continuity

Guidelines | Technical Infrastructure hosting Gaming and Control Systems Remote Gaming December 2015

Add to Reading List

Source URL: www.mga.org.mt

Language: English - Date: 2015-12-17 04:12:52
552Systemic risk / Financial services / European Union / European Insurance and Occupational Pensions Authority / Financial adviser / Markets in Financial Instruments Directive / Insurance broker / Financial regulation / Financial intermediary / Alternative Investment Fund Managers Directive / Insurance / Security

2016 / 2017 Work Schedule – Lobbying at EU Level on behalf of ­Financial Advisers, Insurance Intermediaries and Investment Firms. 2016 / 2017 Work Schedule – Lobbying at EU Level on behalf of Financial Advis

Add to Reading List

Source URL: www.fecif.eu

Language: English - Date: 2016-02-23 09:26:49
553Computing / Security / Cloud computing / E-commerce / Secure communication / Crime prevention / National security / Cloud infrastructure / Payment Card Industry Data Security Standard / Threat Stack / Computer security / Stack

SO LU TIO N B RIEF SECURITY SOLUTIONS FOR PCI DSS AND PII The media and publishing industry’s increasing migration to and expansion in the cloud means you’re tasked with minimizing risk and ensuring compliance throu

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-02 12:48:42
554Computing / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Enterprise application integration / SOA Security / Decentralization / Software as a service / Cloud computing

Issue LXI • AprilReducing Application Cost and Risk through Centralized SOA Security by Mamoon Yunus, CEO of Crosscheck Networks

Add to Reading List

Source URL: servicetechmag.com

Language: English - Date: 2012-04-24 20:38:15
555

Honeypots and the Enterprise: Intelligence-based Risk Management Institute for Security Technology Studies Dartmouth College Hanover, New Hampshire

Add to Reading List

Source URL: www.ists.dartmouth.edu

Language: English - Date: 2008-09-11 13:38:13
    556Risk / Probability / Safety / Actuarial science / Security / Communication studies / Safety engineering / Risk management / Food safety / Federal Institute for Risk Assessment / Food safety risk analysis

    Microsoft Word - Report on risk communication May 2015.docx

    Add to Reading List

    Source URL: www.fsc.go.jp

    Language: English - Date: 2016-03-11 00:29:26
    557Computing / Enterprise application integration / Security / SOA Security / Decentralization / Software as a service / Cloud computing / Computer security

    Issue LXI • AprilReducing Application Cost and Risk through Centralized SOA Security by Mamoon Yunus, CEO of Crosscheck Networks

    Add to Reading List

    Source URL: www.servicetechmag.com

    Language: English - Date: 2012-04-24 20:38:15
    558Merchant services / Actuarial science / Credit / Security / Payment systems / Merchant account / Chargeback / Underwriting / Insurance / Money laundering / Medical guideline / Risk management

    TM MARCH 2014 Electronic Transactions Association

    Add to Reading List

    Source URL: www.electran.org

    Language: English - Date: 2016-02-23 12:28:38
    559Economy / Finance / Money / Structured finance / Financial services / Financial risk / Securities lending / Short selling / Structured product / Repurchase agreement / Bank / Security

    5_CAPITAL MARKETS_ENG_TIM.indd

    Add to Reading List

    Source URL: www.caceis.com

    Language: English - Date: 2015-06-26 07:54:49
    560Computer security / Computing / Security / Computer network security / Data security / Cryptography / National security / Cloud computing security / Vulnerability / Threat / Security controls / Service Organization Controls

    SO C 2 CO MP LIA N CE ACHIEVING SOC 2 COMPLIANCE WITH THREAT STACK As a service provider storing and handling large amounts of customer data, you’re tasked with minimizing risk and exposure to this data. Inadequate se

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-03-16 05:56:01
    UPDATE