SearchCompliance

New & Notable

Evaluate

Risk mitigation strategies for OSI layers

Each layer of the Open Systems Interconnection presents unique vulnerabilities that could move to other layers if not properly monitored. Here's how to establish risk mitigation strategies for OSI layer security in Layers 4 through 7.

Evaluate

OSI security, compliance strategies to reduce risk

Each layer of the Open Systems Interconnection presents unique -- but connected -- vulnerabilities. Here's how to establish OSI security and compliance best practices.

Manage

ITSM innovation: Align new tech with regulations in mind

In this Ask the Expert, IT governance expert Jeffrey Ritter discusses his formula to successfully align new technology with ITSM compliance standards -- all while minimizing risk.

Manage

Ask the expert: Build consumer trust through data protection

Privacy compliance strategy can help build consumer trust and improve security if companies stop looking at the regulations as an obstacle and more as a business opportunity.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Compliance Management challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Compliance Downloads

View All

Compliance Management Basics

  • Get Started

    compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • Get Started

    regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.

  • Get Started

    Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from retaliatory action for voluntarily disclosing information about dishonest or illegal activities occurring in a government ...

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: IT Compliance Advisor

Sections from across SearchCompliance

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close