violations

Results 1 - 25 of 47Sort Results By: Published Date | Title | Company Name
Published By: AppZen     Published Date: Jun 17, 2019
Modern finance teams are embracing AI to audit their invoice-based spend. With AI, they can review all of their invoices prior to payment to spot errors, fraud, and contract violations. AppZen customers have identified 16 critical invoice audit and contract compliance use cases that only AI can make possible.
Tags : 
    
AppZen
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
La protection moderne des données permet aux organisations de réduire les fenêtres de sauvegarde et de restauration des données, ce qui donne lieu à moins de violations de sécurité et à des résolutions plus rapides lorsqu’elles se produisent. Pour véritablement transformer l’IT, modernisez votre datacenter afin d’augmenter l’efficacité IT et de réduire la dette technique, tout en protégeant vos résultats financiers. Stimulez la transformation de l’IT et les résultats grâce aux solutions d’entreprise leaders de Dell EMC, optimisées par Intel®
Tags : 
    
Dell EMC & Intel
Published By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : 
cyberthreat, healthcare, gdpr, ransomware
    
Mimecast
Published By: uberVU via HootSuite     Published Date: Apr 07, 2014
Alors qu'un nombre croissant d'entreprises adopte la puissance des médias sociaux, les violations de la sécurité sont également en hausse. Piratage du Twitter de l'entreprise, salariés malhonnêtes qui usurpent le compte Facebook de l'entreprise, cadres supérieurs qui divulguent des informations confidentielles sur leurs réseaux personnels. Ces sortes de crises peuvent être catastrophiques pour votre marque. Savez-vous comment les éviter?
Tags : 
hootsuite, social relationship platforms, it leadership, social media, social media advice, success stories
    
uberVU via HootSuite
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity
    
Absolute Software
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Fisher Investments     Published Date: Apr 22, 2015
This is whitepaper about best practices for the specific responsibilities and obligations in managing and administering a 401K plan.
Tags : 
best practices, 401k, small business, compliance, liability, violations, responsibilities, financial, fiduciary
    
Fisher Investments
Published By: CA Technologies     Published Date: Aug 24, 2017
Le vol et l’exploitation des identifiants administratifs sensibles entraînent des infractions et la perturbation des opérations. CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: Xangati     Published Date: Sep 01, 2015
If you are a healthcare professional, then you and your organization are caught between the horns of compliance and improving the patient experience. With the Health Information Technology for Economic and Clinical Health Act (HITECH) now in full effect, the days of lax enforcement are over. First-time penalties or violations can reach up to $250,000. The transition to EMR/EHR use, along with all of the systems and equipment upgrading that entails, will be done and done well – or else. Penalties can also extend to your organization’s business associates.
Tags : 
performance management, information technology, cloud and systems virtualization
    
Xangati
Published By: Thawte     Published Date: Oct 06, 2015
Au Royaume-Uni, le coût de la cybercriminalité a atteint le chiffre record de 27 milliards de livres. Mais quelle est la menace réelle pour votre entreprise? Violations de données, usurpation d’identité, phishing, spams, malwares, vulnérabilités... découvrez l’ampleur du risque et les mesures à prendre pour vous protéger.
Tags : 
cybercrime, business threats, phishing and spam, identity theft, security
    
Thawte
Published By: Skillsoft     Published Date: Oct 03, 2014
With the recent increase in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in Europe and other regions, knowledge of bribery rules and regulations has never been more critical. In the US alone, the total fines for FCPA violations levied by the Department of Justice (DOJ) and Securities and Exchange Commission (SEC) in 2013 exceeded $720 million1. Fortunately, effective training and internal communication have been identified as strategies to mitigate your compliance risk. Here are five things you need to know about anti-bribery enforcement trends.
Tags : 
skillsoft, foreign corrupt practices act, fcpa, department of justice, doj, securities and exchange, anti-bribery, enforcement trends, anti-corruption
    
Skillsoft
Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment, network, access, control, maps, leading, compliance, mandates, and helps, automate, grc, operations, federal, rules, nerc, ffiec
    
ForeScout
Published By: UL EduNeering     Published Date: Jul 05, 2012
Good Manufacturing Practices (GMP) violations have become the new healthcare fraud as the Department of Justice (DOJ) tests out new legal theories under the False Claims Act (FCA). The Food and Drug Administration (FDA) has dusted off its regulatory authority to prosecute GMP violations.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11, regulatory compliance, pharmaceuticals, medical device, good manufacturing practices, quality system regulation, online compliance training, part 11 compliance, fda part 11 compliance, iso 13485, quality management system, life science, health care
    
UL EduNeering
Published By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
    
McAfee
Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
The EU's General Data Protection Regulation (GDPR) is the most stringent and burdensome privacy mandate in the world. The penalty for major violations can be up to 20 million euros or 4% of your company's annual global revenue.
Tags : 
protection, regulation, gdpr, data protection, global, revenue, risk
    
Commvault ABM Oct
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Au cours de ces dernières années, la gestion des accès à forts privilèges, un processus englobant différentes fonctionnalités de contrôle, de supervision et d’audit visant à réduire les risques associés aux utilisateurs, aux comptes et aux identifiants à forts privilèges, est devenue une priorité majeure pour les entreprises et organisations de tous secteurs. Cet intérêt accru est motivé par différents facteurs.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access, privileged access management, security, privileged credentials, secure it
    
CA Technologies EMEA
Published By: Mirage Networks     Published Date: Aug 21, 2009
This industry report gives you the information you need to make decisions about how to secure your network by controlling access and by preventing endpoint infections and policy violations.
Tags : 
network security, nac, network access control, access control, endpoint security, end-point security, intrusion prevention, policy based, policy-based, mirage, mirage networks
    
Mirage Networks
Published By: Skillsoft     Published Date: Mar 06, 2014
Establishing an integrated GRC framework gives a company visibility and insight, plus the ability to reduce cost and exposure to violations, and increased control over remote operations and employees.
Tags : 
skillsoft, governance, risk management, compliance, grc framework, remote operations
    
Skillsoft
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : 
data loss, security, file sharing, mobile workforce
    
Citrix ShareFile
Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data, it management, knowledge management, enterprise applications
    
Aternity
Published By: HotSchedules     Published Date: Sep 11, 2018
There’s no two-second rule when it comes to the law, and in today’s legal environment, maintaining compliance is crucial now more than ever. This ebook provides an overview of the labor laws that impact restaurants today and the high cost of non-compliance. It also presents the features of an automated system that gives restaurants the capabilities they need to meet today’s increasingly complex labor compliance regulations—so they can avoid the high price of non-compliance and create work environments that better serve their employees’ needs and rights.
Tags : 
    
HotSchedules
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee