Looking for something else?
February 17, 2014
Experts differed over whether the NIST cybersecurity framework provides critical infrastructure firms with the tools to defend themselves.
July 30, 2010
The research firm's new 123-point maturity model is intended to go beyond COBIT as a more comprehensive way to help companies find and fix gaps in their infosec programs.
October 30, 2008
Ernst & Young's 2008 Global Information Security Survey finds both positive and negative trends in information security depending on how you look at the numbers.
October 20, 2005
It's difficult for most organizations to cope with today's multitude of compliance regulations, but an expert at Information Security Decisions said security frameworks may be the answer.
COBIT Get Started
Bring yourself up to speed with our introductory content
Expert Mike Chapple details the COBIT 5 certification process and determines if security and compliance professionals should pursue it. Continue Reading
COBIT is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices. Continue Reading
The Sarbanes-Oxley Act does not detail compliance requirements for IT, so many enterprises and auditors have adopted the standard COBIT, introduced here. Continue Reading
Evaluate COBIT Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Organizations need to prioritize security over compliance to ensure comprehensive risk mitigation. Continue Reading
Three organizations reveal how they use a combination of frameworks such as COBIT or ISO 27001 along with GRC tools satisfy overlapping industry and federal regulatory demands. Continue Reading
Governance, risk and compliance (GRC) is being used as a catch-all phrase for most information security strategies and tagged onto various products, adding even more confusion in the market as to what it truly means or promises to corporations. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
It makes the discovery of applications and classification of user traffic simple but I'd like to see a roadmap for SSL decryption.Powered by IT Central Station
Valuable Features: I'm most impressed with the visibility and control SourceFire solutions provide in to the types of traffic flowing in and out...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Learn to apply best practices and optimize your operations.
Outsourcing may relieve some of a company's burdens, but handing off business functions doesn't necessarily mean less work for security teams when sensitive information or critical infrastructure hang in the balance. In this tip, Richard Mackey ... Continue Reading
Problem Solve COBIT Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Joe Granneman introduces several IT security frameworks and standards, and offers advice on choosing the right one for your organization. Continue Reading
Expert Mike Chapple offers advice for understanding COBIT and what it takes to acquire COBIT 5 certification. Continue Reading
In this tip, learn how to integrate the new management practices from COBIT 5 into current IT security framework implementations. Continue Reading