How did the 2013 update change the ISO 27001 standard?

Enterprise Risk Management: Metrics and Assessments

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Should ISO 17799 play a role in risk assessment?

    In this SearchSecurity.com Q&A, security pro Mike Rothman offers advice on the best risk assessment procedures, and discusses whether or not ISO 17799 should be involved in the process. 

  • Do personal issues within a company pose a risk to the enterprise?

    In this SearchSecurity.com Q&A, security management expert Mike Rothman unveils how to manage and address a potential risk within your corporation. 

  • Reacting to a business partner's insider threat

    In this SearchSecurity.com Q&A, security management pro Mike Rothman explains how to address a business partner's weak data security policies. 

  • Gartner: Making the case for enterprise security architectures

    Gartner IT Security Summit: An enterprise security architecture is an important part of a long term strategy and can help mitigate the risks when data is used in new ways. 

  • HP touts security, trust as it pursues smaller businesses

    Hewlett-Packard Co. (HP) realigned its storage group in January, creating a new business unit in its Enterprise Storage and Server (ESS) group that is focusing on HP's Storage Essentials and Server Essentials software. The company also began pushing ... 

  • Endpoint Security

    Read an excerpt from the book, Endpoint Security. In Chapter 3, "Something is Missing," author Mark S. Kadrich reveals a new way of modeling the network. 

  • HP targets energy compliance with appliance

    A new appliance from HP touts event data management software from San Francisco-based SenSage Inc. to centrally store logging data for audits and investigations. 

  • Blogging on corporate laptops is risky business

    Employees may think it's no big deal to do some blogging on a company laptop from home or the airport. But one security expert says the practice poses some serious risks. 

  • IBM uses model to understand data governance

    Steven Adler, program director of Data Governance Solutions for IBM and chairman of the Data Governance Council, has been working to understand the growing need for data security, the issues surrounding data compliance and data protection problems. I... 

  • Hacker techniques use Google to unearth sensitive data

    Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns.