-
HIPAA Omnibus Rule, PPACA challenge enterprise compliance management
Compliance practitioners say new mandates like the HIPAA Omnibus Rule and Obamacare are making enterprise compliance management even harder.31 May 2013
-
Report finds security tools add software vulnerabilities of their own
A report by iViZ Security Inc. found that overall vulnerabilities in security products in 2012 rose sharply.31 May 2013
-
How enterprises can prepare for Project Blitzkrieg-style DDoS attacks
Expert Nick Lewis offers security measures that enterprises, particularly financials, can utilize to fend off Project Blitzkrieg-style DDoS attacks.31 May 2013
-
Quiz: Database security issues
This 10-question quiz will test your knowledge of the key points we’ve covered in the webcast, podcast and tip in this database security school lesson.30 May 2013
-
Understanding database security issues
This presentation takes a look at vulnerabilities that directly affect database security and what enterprises should do to monitor database access to detect potential security incidents.30 May 2013
-
Database security issues
The start of many data security issues is, of course, the database. In this security school, we'll examine the predominant database security vulnerabilities and offer best practices on how to monit...30 May 2013
-
Aligning business and IT security: Learning from South Carolina breach
Ernie Hayden details how South Carolina's Department of Revenue breach proves business and IT security are often out of alignment, and how to fix it.28 May 2013
-
How to reduce IT security risk with IT asset management
IT asset management expert Barb Rembiesa explains how ITAM best practices like IT asset standardization and rationalization reduce IT security risk.28 May 2013
-
Case study: CDI launches aviation company DLP program on short runway
Technology services company CDI-Aerospace used a Verdasys DLP solution to manage third-party risk for a major aviation client.24 May 2013
-
IT certification guide: Vendor-specific information security certifications
Updated for 2013, experts Ed Tittel and Mary Lemons guide you through the crowded field of vendor-specific information security certifications.23 May 2013
-
SearchSecurity.com's IT security certifications guide
Afraid of making a wrong turn in your career? Our newly updated 2013 guide to information security certifications maps out all your options.23 May 2013
-
Introduction: Vendor-neutral security certifications for your career path
Ed Tittel and Mary Lemons offer the definitive primer for vendor-neutral security certifications in 2013.23 May 2013
-
Boosting information security budgets: How to get the funds you need
Getting executive support to boost the information security budget is no easy task. Expert Joe Granneman offers tips for getting the funds you need.21 May 2013
-
Open source security tools: Getting more out of an IT security budget
Open source security tools can help stretch your IT security budget further -- that is, if you use them strategically. Joseph Granneman explains how.21 May 2013
-
Using network flow analysis to improve network security visibility
To overcome network security issues from advanced attackers and BYOD, security professionals are turning to network flow analysis to gain improved network security visibility.21 May 2013
-
Sourcefire updates malware detection, malware analysis capabilities
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware.21 May 2013
-
Goals for how to become a CISO if you're a security technologist
Security technologists aspiring to become CISOs must develop a variety of business skills, as Joe Granneman explains in this Ask the Expert Q&A.20 May 2013
-
Information Sharing and Analysis Centers: Getting started with ISACs
Joe Granneman explains how ISACs enable cybersecurity information sharing and the basic requirements for joining an ISAC.20 May 2013
-
Using EMET to harden Windows XP and other legacy applications
Expert Michael Cobb details how using EMET, a free tool from Microsoft, can harden Windows XP and other legacy applications.17 May 2013
-
Zed Attack Proxy tutorial: Uncover Web app vulnerabilities using ZAP
Video: Keith Barker of CBT Nuggets offers a OWASP Zed Attack Proxy tutorial. Learn how to find and nullify Web application vulnerabilities using ZAP.17 May 2013
Security Management Strategies for the CIO