Access your Pro+ Content below.
Effective strategies for risk management and security information management systems
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
One security professional describes a homegrown risk methodology currently being used by a large university and a private corporation.
Vendors loosely using the term cloud computing are causing confusion for users in the market for buying and securing these services.
They've come a long way from the early days of log aggregation and correlation; enterprises now glean value from SIMs for compliance, visualization, and even overall business intelligence.
Columns in this issue
Cloud computing carries risks that enterprises need to weigh before they forge ahead.
The economy is forcing organizations to be more resourceful and bury the hatchet. And that's a good thing.