Access "Key steps for security incident response planning"
This article is part of the April 2011 issue of Successful cloud migrations require careful planning
Most IT leaders know they must align with the business to be successful. However, one area where organizations continue to slip up is incident response planning. Enterprises spend copious amounts of time developing security policies and processes in order to secure systems and prevent breaches and data loss. Yet when a security breach occurs, they typically don't have a process in place to manage a coordinated response, within IT and external to IT. There are a variety of reasons organizations may not have a coordinated security incident response plan. Perhaps the organization has invested in IT security, which is about technology, rather than information security, which focuses on strategy and business process. Part of that business component is incident handling. While incident handling is tactical in nature, it's driven out of program strategy and is used to manage tactical responses. SECURITY INCIDENT HANDLING DEFINED Information security incident handling is an action plan for dealing with intrusions (internal/external), cybercrime (copyright violations... Access >>>
Premium Content for Free.
Application whitelisting: an extra layer of malware defense
by Eric Ogren, Contributor
Application whitelisting was hyped as an antivirus killer. Its real role is serving as an added weapon in the battle against malware.
Key steps for security incident response planning
by Ravila Helen White, Contributor
Security incidents are going to happen. Don't get caught flat footed.
- Application whitelisting: an extra layer of malware defense by Eric Ogren, Contributor
Antivirus vendors go beyond signature-based antivirus
by Robert Westervelt
Security vendors are adding new capabilities into their products to keep up with the surge in malware.
Cloud migration requires network retooling
by David Newman
Learn what is required for cloud migration, including retooling of network design and security controls such as encryption and DLP.
- Antivirus vendors go beyond signature-based antivirus by Robert Westervelt
An Internet kill switch bill wouldn't ensure security
by Paul Rohmeyer
Giving the president power to shut down the Internet would have devastating consequences.
Information security professionals can't waste this opportunity
by Michael S. Mimoso, Editorial Director
Grab your newfound visibility by the horns and figure out how to bring oversight and direction to cybersecurity.
Marcus Ranum and Gary McGraw talk about software security issues
by Marcus J. Ranum, Contributor
Marcus Ranum and Gary McGraw discuss software security issues in this new bimonthly feature where Marcus Ranum goes one on one with a fellow security industry insider.
- An Internet kill switch bill wouldn't ensure security by Paul Rohmeyer
More Premium Content Accessible For Free
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security ...
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...