Compliance with Sarbanes-Oxley (SOX) is impossible without IT professionals, but translating this law into IT action items is a challenge.
With penalties up to $10 million fines and even prison time, following SOX—and proving you're compliant—is vital.
This compliance guide breaks down the most important aspects of SOX that affect IT professionals and focuses on what you need to know to get...
The Health Insurance Portability and Accountability Act (HIPAA) is one of today’s most common compliance mandates, but translating this law into IT action items is a challenge.
As fines increase and more audits are scheduled, figuring out how which data HIPAA protects and how to bring your system into compliance is more important than ever.
This compliance guide breaks down some of the thorniest...
If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
With any security implementation, established rules become less effective as time passes. Because your security requirements and your systems aren’t static, you must continually audit and adapt your security plan to stay current. Be aware that your system is constantly changing.
IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions.
How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already?
In the quest to get better sleep, it is a good idea to self-audit your...
For budding companies, server sprawl may be just one of many growing pains—a temporary inconvenience for a greater good. But if you’re struggling to complete processes on time, stalling with the auditors, and jumping from server to server whenever an error occurs, it’s time to ask the tough questions.
Founded in 1947, International Rectifier (IR) is a world leader in advanced power management technology. The company’s 5,400 worldwide employees support operations in 20 countries. Annual revenues are approximately $1 billion.
Compliance Regulations Remain at the Top of Exec's Minds
Sarbanes-Oxley (SOX) hasn’t disappeared and remains at the top of many executives’ minds. Among other stipulations...
An up-to-date and comprehensive runbook won't win you any awards. But when you get the green light to implement a workload automation tool, documentation is your lifeline. Unfortunately, most runbooks aren’t up to snuff.
System and data security—along with PCI compliance—are top concerns for Amway. They turned to Policy Minder for help automating security administration.
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.