Features

Features

Information Security Incident Response-Information

  • Endpoint Security

    Read an excerpt from the book, Endpoint Security. In Chapter 3, "Something is Missing," author Mark S. Kadrich reveals a new way of modeling the network.  Continue Reading

  • PING with Bernard Donnelly

    In this exclusive interview with Information Security magazine, Bernard Donnelly, vice president of quality assurance for the Philadelphia Stock Exchange, discusses how and why his organization transitioned to a wireless trading system the measures ...  Continue Reading

  • Business continuity planning standards and guidelines

    An excerpt from Chapter 1: Contingency and Continuity Planning of "Business Continuity and Disaster Recovery for InfoSec Managers," by John W. Rittinghouse and James F. Ransome.  Continue Reading

  • Privacy Breach Impact Calculator

    How much would a customer privacy breach impact your business? This calculator by information security and privacy expert Rebecca Herold, CISSP, CISM, provides an example of some of the items an organization should consider when estimating the ...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close