BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘FISMA’

Data Governance – Why and How?

In my first blog post I talked about proving and maintaining compliance for data governance rules defined for file system resources in the enterprise. This post will continue the discussion of data governance, reviewing some of the reasons organizations are implementing these policies and processes as well as the main challenges associated defining the rules…

Post by Morgan Holm July 30, 2011
Tags:
, , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE

Configuration Compliance and Regulatory Reporting

In recent years there have been an increasing number of legislated regulatory mandates with which organizations must comply with to prove the confidentiality, integrity and availability of information stored in their systems and provided through external parties. After reading various whitepapers, websites and other articles that loosely use the terms “PCI, HIPAA, SOX, CIS, NIST,…

Post by Brad Hibbert September 9, 2010
Tags:
, , , , , , , , , , , ,