About 9 results
Open links in new tab
  1. How do you align an IT risk assessment with COBIT controls?

    Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.

  2. How to build a toolset to avoid Web 2.0 security issues

    Learn what to include in a toolset to thwart Web 2.0 security issues like lost productivity, data leaks and increased enterprise risk.

  3. Search Security Resources and Information from TechTarget

    To achieve security outcomes that align with their organizations' risk appetites and business objectives, CISOs with struggling SOCs must consider upgrades. Learn more.

  4. Information Security Incident Response-Information

    Learn how computer forensics and an incident response plan, team and policy can help avoid further disaster after a data security breach or laptop theft.

  5. Verizon data breach report shows weak passwords at root of 2011 …

    Mar 7, 2012 · Hacking and automated attacks made simple by poor password management practices were at the root of most 2011 data breaches, and many firms failed to detect the …

  6. Information security incident response

    AI in risk management: Top benefits and challenges explained AI and machine learning tools can aid in risk management programs.

  7. Hacker tools and techniques: Underground hacking sites

    May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.

  8. Week 10: Are you throwing out company secrets? (Part 1

    In an effort to help busy security managers, CISSP Shelley Bard's weekly column will build upon the concept of the perpetual calendar, offering a schedule of reminders for a proactive, …

  9. Spy-nux update: NSA SELinux draws interest from open source …

    The NSA's Security Enhanced Linux (SELinux) uses best practices to keep systems secure. This framework, although complex, is reliable and flexible to changes in security.