Email Alerts
-
During a breach, how much information should be given out?
A security manager's nightmare: There's been a data breach, and it's time to pick up the pieces. But to recover as quickly as possible, who needs to know what about the data breach, and when? Security management expert Mike Rothman gives advice. Ask the Expert
-
Should organizations implement an incident severity ratings system?
Having an incident severity ratings system can help sort the critical incidents from those that only pose small threats. In this security expert response, learn the importance of an incident severity ratings system, and how to implement one. Ask the Expert
-
Finding lost notebooks with 'LoJack for laptops'
LoJack software can be helpful in retrieving stolen laptops, but there may be a better way. Security management expert Mike Rothman explains the pros and cons. Ask the Expert
-
What are the roles of a liaison officer?
Security incident response is one of the main duties of a liaison officer. Security management expert Mike Rothman explains. Ask the Expert
-
What are the proper procedures for handling a potential insider threat?
In this SearchSecuity.com Q&A, Mike Rothman discusses how corporations can avoid insider threats by forming an incident response plan and monitoring employee behavior. Ask the Expert
-
How should security and networking groups manage the firewall?
When it comes to firewalls, the networking group often handles the installation, while the information security department writes the rules. Should these responsibilities be split? In this expert Q&A, security management pro Shon Harris reveals how e... Ask the Expert
-
Developing an incident response plan
In this Ask the Expert Q&A, Shon Harris provides resources you can use to devise an effective incident response plan. Ask the Expert
-
Courses on threat management and incident response
Ask the Expert
-
Resources for creating a Disaster Recovery Plan
Ask the Expert
-
Restoring files & pushing antivirus updates
Ask the Expert
Security Management Strategies for the CIO