Risk assessments metrics and frameworks
- October 14, 2008
More employees are leaving the office with sensitive business and customer data on laptops, smartphones and USB flash drives, bypassing security policies to get their work done.
- October 13, 2008
Steven Katz, widely recognized as one of the first CISOs in the security industry, has been keeping an eye on the current financial crisis and company information risk management processes. Katz, a former CISO at Citigroup, JP Morgan and Merrill ...
- October 06, 2008
The Chrome Web browser is a platform for Google Apps and as end users adopt Chrome, companies could lose control of sensitive corporate data.
- September 15, 2008
Former QSA turned Forrester analyst John Kindervag calls PCI a "communicable disease." Anything introduced to the network is in PCI scope if credit card systems aren't segmented.
- September 05, 2008
Protecting customer data, corporate intellectual property and other sensitive internal data, remains a priority in many corporate board rooms, a Forrester Research survey finds.
- August 28, 2008
Using visualization tools, security pros can build charts and graphs to make sense of complex log files and data and improve their company's security stance.
- July 17, 2008
Companies are concerned about unintentional data leaks, according to a survey conducted by Osterman Research.
- July 09, 2008
The subprime mortgage crisis illustrates the critical need for enterprises to implement processes for governing data, says IBM Council chairman.
- July 01, 2008
Accurate information on attacks and data breaches could boost research and drive innovation.
- June 25, 2008
Not enough security pros are tracking the successes of their security programs and properly articulating their value to senior level management.
- June 13, 2008
Panelists at the Symantec Vision 2008 conference said a well implemented IT governance, risk and compliance (GRC) program boosts revenue and cuts costs.
- June 02, 2008
Speaking to IT security pros at the Gartner IT Security Summit, Google's Scott Petry said the company is constantly trying to understand the latest threats.
- June 02, 2008
Security pros are beginning to use metrics to measure the effectiveness of security technologies and strengthen budget requests, but those measurements are still being inhibited, some experts say.
- May 29, 2008
HP offers application scanning as a service to meet IBM's Watchfire AppScan OnDemand software. Interest is being driven by the growing use of Web applications.
- March 19, 2008
The security incident at the Hannaford supermarket chain and elsewhere have some wondering if it's time to purchase data breach insurance. But experts say there are drawbacks.