Access "Cloud Compliance: Tackling Compliance in the cloud"
This article is part of the Nov. 2012/Volume 14/No. 9 issue of Seven Outstanding Security Pros in 2012
Moving to a cloud environment brings compliance challenges, but they’re not insurmountable. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
PDF download: Information Security magazine November 2012
by Information Security magazine staff
In this issue, find out who won this year’s Security 7 Award, Also, we examine the pros and cons of the Metasploit penetration testing framework.
-
Information Security Decisions: From Dogma to Data
by Wade Baker
The information security field needs to overcome information sharing roadblocks to improve decision making.
-
Security Warrior for Cloud Transparency
by Jim Reavis
Ron Knode, who passed away earlier this year, was a tireless advocate for cloud security transparency.
-
Security Risk Assessment a Team Effort at Notre Dame
by David Seidl
The university created a committee to tackle risk assessment on an ongoing basis.
-
The new era of big data security analytics
by Preston Wood
The information security industry needs to shift its focus to data-driven security.
-
Cloud Compliance: Tackling Compliance in the cloud
by Davi Ottenheimer
Moving to a cloud environment brings compliance challenges, but they’re not insurmountable.
-
PDF download: Information Security magazine November 2012
by Information Security magazine staff
-
-
Old Application Vulnerabilities, Misconfigurations Continue to Haunt
by Robert Westervelt, News Director
Flaws in legacy applications and configuration blunders still plague organizations, experts say.
-
Developing a BYOD Strategy
by Krishnan Chellakari
Organizations need to consider benefits and risks as they embrace BYOD.
-
GRC Management and Critical Infrastructure Protection
by Doug Powell
GRC needs to adapt to become a truly effective risk management tool for critical infrastructure.
-
FISMA Compliance and the Evolution to Continuous Monitoring
by John Streufert
The U.S. Department of State developed a system for improving federal cybersecurity.
-
Metasploit Review: Ten Years Later, Are We Any More Secure?
by George V. Hulme, Contributor
Some say the pen testing framework is a critical tool for improving enterprise security, while others say it helps attackers.
-
Old Application Vulnerabilities, Misconfigurations Continue to Haunt
by Robert Westervelt, News Director
-
Columns
-
Security 7 Award 2012: Seven Outstanding Information Security Pros
by Marcia Savage
This year’s award recognizes talented pros in an industry that presents relentless challenges.
-
Protecting Intellectual Property: Best Practices
by Peter J. Toren
Organizations need to implement best practices to protect their trade secrets from both internal and external threats.
-
Pros and Cons of Information Security Certifications
by Doug Jacobson and Julia A. Rursch
Educating the security professional requires far more than a certification exam.
-
Marcus Ranum chat: Next-generation SIEM
by Anton Chuvakin
Security expert Marcus Ranum goes one-on-one with Gartner’s Anton Chuvakin about SIEM technology and where it’s headed.
-
Security 7 Award 2012: Seven Outstanding Information Security Pros
by Marcia Savage
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO