Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Compliance » Page 2

  1. Home
  2. Compliance
  3. Page 2

Category: Compliance

Compliance Research

Risks in Core Banking Migration

This article highlights some of the key risks in executing a successful core banking migration program. Many of these risk elements also relate to any large IT project, but are more aligned towards a core banking migration.

September 15, 2015
1
Compliance Research

Vendor Risk Assessment

Introduction Companies today have third party contracts with various vendors. Most of the process are outsourced to various companies. This is the most convenient and […]

September 9, 2015
0
Compliance Reading

Social Media Usage in the Enterprise

Introduction With the onslaught of SMAC – Social Media, Analytics, Mobility and Cloud Computing – in our personal as well as professional lives, we are […]

September 7, 2015
0
Compliance Laws & Regulations

PCI DSS Penetration Testing Guidance

The Payment Card Industry Security Standards Council recently released their updated Information Supplement: Penetration Testing Guidance. The guidance document was last published in 2008 under […]

April 10, 2015
0
Case Studies Compliance Laws & Regulations

IT Act 2000 – Penalties, Offences With Case Studies

Objectives of IT legislation in India The Government of India enacted its Information Technology Act 2000 with the objectives stating officially as: “to provide legal […]

June 24, 2014January 10, 2025
6
Compliance Research

HIPAA Compliance – Introduction & Pointers

Introduction Protecting the confidentiality, integrity and availability of patient information by healthcare organizations became a legal requirement via the Health Insurance Portability and Accountability Act, […]

August 5, 2013
2
Compliance Fundamentals Laws & Regulations Opinion Reading

Getting Your BYOD Policy Right

Bring your own device (BYOD) is the business policy of letting employees bring their own devices at workplace for doing work. The concept has gained […]

July 29, 2013
0
Compliance

ISO 27001:2013 Draft – Differences From The Earlier Standard – Part I

The new draft of ISO 27001 standard has been made more objective, logical in flow and precise, eliminating the elaborated and/or indirect contextual statements. As […]

July 12, 2013January 10, 2025
8
Compliance

ISO 27004 – Information Security Metrics Implementation

Introduction Compliance to the ISO 27001 standard and associated controls helps an organization to understand information security risks and develop an information security management system […]

July 5, 2013January 10, 2025
0
  • 2 / 2
  • 1
  • 2

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top