Email Alerts
-
How to perform an enterprise risk analysis
Some IT security best practices might not be right for your enterprise. In this expert response, learn how to perform an enterprise risk assessment and analysis to determine which of your resources are at risk and how to protect them. Ask the Expert
-
A recovery point objective (RPO) vs. a recovery time objective (RTO)
When making business continuity and disaster recovery plans, it's essential to come up with a recovery point objective (RPO) and a recovery time objective (RTO), but what is the difference between the two? Find out more in this expert response. Ask the Expert
-
Risk management strategy for an information technology solution provider
Looking to create an enterprise risk management strategy for an information technology solution provider? Security management expert David Mortman weighs in. Ask the Expert
-
The requirements needed to make an external penetration test legal
Rule number one of pen testing: Make sure you have permission in hand before you begin. But there's much more than this needed to perform a successful penetration test on a wireless network. Ask the Expert
-
How to choose a general security risk assessment
Looking to do a general security risk assessment, but aren't sure how to choose one? In this security management expert response, David Mortman explains how to assess risk and get the funding you need to mitigate it. Ask the Expert
-
How to quantify business risk exposure to malware
How safe is your enterprise from data-stealing malware? How can you know where your security program falls short? Find out how to gauge enterprise risk exposure to malware in this expert response. Ask the Expert
-
How can gap analysis be applied to the security SDLC?
When developing software securely, what role does gap analysis play? In this security management expert response, learn how to implement gap analysis into software development, and how it can help stop data leaks at your enterprise. Ask the Expert
-
How does information security prevent fraud in the enterprise?
When an enterprise is worried about fraud, where does the information security team step in? Security management expert Mike Rothman explains the role information security plays in enterprise fraud-prevention activities. Ask the Expert
-
Are independent researchers out for fame?
According to a recent X-Force report, it seems some independent researchers may be more interested in fame than exposing security risks. But how accurate is this assessment? Security management expert Mike Rothman gives his take on the issue. Ask the Expert
-
Best practices for managing DNS, knowing it's anything but trustworthy
Since the DNS cache-poisoning flaw was exposed, DNS security has come under scrutiny. Security management expert Mike Rothman explains where DNS security should live within the risk matrix. Ask the Expert
Security Management Strategies for the CIO