Tips
Tips
Regulatory compliance with cybersecurity laws and regulations
-
HIPAA security checklist: 10 services your customers need
HIPAA compliance services can lead to solid business growth for solution providers. Kevin McDonald's HIPAA security checklist has 10 ways to begin. Continue Reading
-
Regulatory compliance requirements for security solutions providers
Customers aren’t the only firms that need to comply with regulations. In many cases, solution providers need to be compliant, too. Continue Reading
-
Opportunities abound for providing HIPAA compliance services
Recent HIPAA updates mean many firms -- not just health care firms -- must now become HIPAA compliant. Kevin McDonald explains where to find them. Continue Reading
-
PCI guide: PCI DSS documentation, resources for solution providers
Beyond basic PCI DSS assessments and reporting, solution providers may need to access PCI DSS documents for emerging technologies and other standards, as detailed in this guide. Continue Reading
-
Guide to PCI documents: PCI levels, assessments and reports
There are a myriad of different documents for understanding, assessing and reporting PCI DSS compliance. This guide explains which documents to use and where to find them. Continue Reading
-
Security product specialization key for Oracle VAR success
Considering adding an Oracle security product to your line card? This article will guide your choice based on your current skill set. Continue Reading
-
Opportunities from SOX compliance requirements are limited, risky
Expert Kevin McDonald concedes that security solution providers’ opportunities from SOX compliance requirements are limited and the risks are disproportionately high. Continue Reading
-
PCI and virtualization: Enabling VMs with PCI compliance services
The new PCI DSS security standard allows merchants to run a virtualized environment and still be compliant. David Jacobs explains they will need your help with tools and processes. Continue Reading
-
A security integrator's checklist for evaluating customer security
These 10 things will enable security integrators and resellers to determine which security threats are applicable to a customer's business. Continue Reading
-
Data encryption methods: Lay out the options for your customer
Rich Mogull of Securosis explains why partners need to live up their name and team up with customers on encryption implemenation and integration. Continue Reading
-
The elements of a regulatory compliance program
In this video, Richard E. Mackey Jr. reviews a compliance program structure that will incorporate any of the regulations and guidelines that your customers will need to comply with. Continue Reading
-
How to prepare for emerging data protection laws
Richard Mackey of SystemExperts explains how solution providers can position their customers' technological and risk-based controls so that they are ready for future data protection laws. Continue Reading
-
Implementing database monitoring tools for 201 CMR 17 compliance
Adrian Lane of Securosis reviews what solution providers need to watch for when they implement database activity monitoring products and help customers achieve 201 CMR 17 compliance. Continue Reading
-
Your Massachusetts 201 CMR 17 checklist of security controls
In this video, John Moynihan of Minuteman Governance reviews the technical, administrative and physical security controls that organizations need and often don't have. Continue Reading
-
HIPAA, HITECH and the challenges of a 'business associate'
Kevin McDonald of Alvaka Networks talks about why his designation as a "business associate" has changed his compliance priorities, particularly with HIPAA. Continue Reading