About 12 results
Open links in new tab
  1. Security automation systems, tools and tactics

    Pair cyber insurance, risk mitigation to manage cyber-risk The role of cyber insurance may come after a breach, but it remains a useful element in an organization's vulnerability management …

  2. How do you align an IT risk assessment with COBIT controls?

    Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.

  3. How to build a toolset to avoid Web 2.0 security issues

    Learn what to include in a toolset to thwart Web 2.0 security issues like lost productivity, data leaks and increased enterprise risk.

  4. Hacktivism examples: What companies can learn from the HBGary …

    In one of the most blatant hactivism examples in recent memory, the group Anonymous compromised the security company HBGary Federal. Learn more about what took place in the …

  5. Information Security Incident Response-Information

    Learn how computer forensics and an incident response plan, team and policy can help avoid further disaster after a data security breach or laptop theft.

  6. Find the SIEM platform that fulfills your SIEM requirements

    After deciding what your enterprise needs from a security information and event management system, it must find the SIEM platform that best suits these needs. By Adrian Lane, Securosis

  7. Portable USB thumb drive encryption: Software and security policy

    Looking at portable USB thumb drive encryption options? Learn about free and commercial portable data encryption software for USB drives, as well as creating a USB encryption …

  8. What Are Random Numbers and How Are They Used?

    A random number is chosen from a set of numbers, typically using a random number generator. Random numbers are used in cryptography and other applications.

  9. Database Security Management-Enterprise Data Protection

    Learn more about database security gateways, database encryption, issues, threats, software, security gateways, how to detect database vulnerabilities.

  10. Information security incident response

    AI in risk management: Top benefits and challenges explained AI and machine learning tools can aid in risk management programs.