How did the 2013 update change the ISO 27001 standard?

Enterprise Risk Management: Metrics and Assessments

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Symantec acquires automated risk assessment firm

    Symantec has acquired Reston, Va.-based 4FrontSecurity, a maker of automated risk analysis and security management tools. An expert says it's the latest sign that the security risk assessment market is heating up. 

  • Forget ROI; Use Six Sigma to prove business value

    The classic ROI equation doesn't apply to information security, but that doesn't stop management from asking for metrics. Learn how Six Sigma can be used to prove the business value of security. 

  • PatchLink acquires STAT Guardian tool

    PatchLink Corp. says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp. 

  • Review: Sky's the limit with Skybox View 3.0

    Hot Pick: Skybox View 3.0 offers a unique and flexible approach for assessing and managing specific threats and overall risk to your digital assets. 

  • IBM to acquire compliance software firm

    IBM plans to acquire Consul Risk Management Inc., a Delft, Netherlands-based firm whose software tracks non-compliant behavior of employees. 

  • Insider security threats come in many forms

    Insiders could be the greatest threat to a company's security. The best defense is to let them know Big Brother is watching and a plan to deal with troublemakers. 

  • What is the risk estimation model for SSL VPN implementation?

    Risk assessment is a common way to evaluate new technologies. In our SearchSecurity.com Q&A, network security expert, Mike Chapple, explains how to determine if SSL VPN implementation is right for your organization. 

  • What is the average cost of an MSSP?

    Looking to find the startup and maintenance costs of an MSSP? In this Ask the Expert Q&A, application security expert, Michael Cobb outlines the key issues for businesses to consider when examining managed security arrangements. 

  • CISOs and the false sense of security

    As many of our regular readers know, Ira Winkler is not a big fan of the way most research firms gather and present information – and he's not shy about hammering the point home. This time around, Winkler says a recent survey touching on the us... 

  • Risk management: Data organization and impact analysis

    This first article of the Insider Threat Management Guide explains how to data organization is the first step in implementing insider threat controls.