Email Alerts
-
Security Metrics: Replacing Fear, Uncertainty, and Doubt
In this chapter excerpt from "Security Metrics: Replacing Fear, Uncertainty and Doubt," author Andrew Jaquith reveals ways to present security data in a clean and elegant manner. Book Chapter
-
Endpoint Security
Read an excerpt from the book, Endpoint Security. In Chapter 3, "Something is Missing," author Mark S. Kadrich reveals a new way of modeling the network. chapter excerpt
-
Risk management: Implementation of baseline controls
This fourth article in the Insider Threat Management Guide examines the implementation of baseline controls. Learning Guide
-
Insider Threat Management Guide
In this Insider Threat Management Guide, contributor Gideon Rasmussen reviews how to fortify your organization's current insider threat controls and keep internal dangers to a minimum. Learning Guide
-
Risk management: Baseline management and control
Identifying baseline controls is the second step to implementing insider threat controls as described in this article from SearchSecurity's Insider Threat Management Guide. Learning Guide
-
Risk management: Data organization and impact analysis
This first article of the Insider Threat Management Guide explains how to data organization is the first step in implementing insider threat controls. Learning Guide
-
Risk management audit
This article explores the audit function in the insider threat management process. Learning Guide
-
Business continuity planning standards and guidelines
An excerpt from Chapter 1: Contingency and Continuity Planning of "Business Continuity and Disaster Recovery for InfoSec Managers," by John W. Rittinghouse and James F. Ransome. Book Chapter
-
Alphabet soup: Understanding standards for risk management and compliance
This article makes sense of the soupy mix of standards by taking a closer look at the various methodologies and frameworks, and examining what each has to offer. Information Security maga
-
Privacy Breach Impact Calculator
How much would a customer privacy breach impact your business? This calculator by information security and privacy expert Rebecca Herold, CISSP, CISM, provides an example of some of the items an organization should consider when estimating the potent... Privacy Breach Impact Cal
Security Management Strategies for the CIO