New & Notable
Information Security Policies, Procedures and Guidelines News
November 14, 2014
News roundup: A recent study revealed IT pros' confidence in implementing basic security measures is high, contradicting data that enterprises consistently fail to thwart basic attacks. Plus: BrowserStack hack lessons; responsible phishing reporting...
November 10, 2014
Mergers and acquisitions present opportunities for attackers interested in valuable data, but experts say most enterprises fail to perform a network security assessment before proceeding with a deal.
July 29, 2014
Corporate boards have increased their awareness of security issues, but experts say they still lack information security principles.
April 22, 2014
The Verizon DBIR 2014 shows that organizations should build a security strategy around industry-specific threats and incident patterns.
Information Security Policies, Procedures and Guidelines Get Started
Bring yourself up to speed with our introductory content
In his debut 'Security that Works' column for SearchSecurity, Eric Cole of the SANS Institute challenges infosec pros to grade themselves on the three fundamental aspects of any successful enterprise security program. Continue Reading
Immature products and a lack of standardization raise critical questions about first-party risk and third-party liability. Continue Reading
Information security (infosec) is the set of business processes that protects information assets regardless of how the information is formatted or whether it is being processed, is in transit or is being stored. Continue Reading
Evaluate Information Security Policies, Procedures and Guidelines Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Readers vote on the best risk and policy management products of 2014. Continue Reading
Though perhaps a ways off, it may be worthwhile to prepare a Google Glass security policy now, before it's a problem. Expert Joseph Granneman explains what to expect. Continue Reading
Expert Ernie Hayden takes an in-depth look at the development of NIST SP800-82 since its birth, and what the standard includes in the most recent revision. Continue Reading
Product ReviewsPowered by IT Central Station
Chose Zabbix over Nagios but wouldn’t suggest an in-house Zabbix implementation without a technical staffPowered by IT Central Station
Valuable Features: Open Source: All the sources for all the products are Open Source, so you can use a complete product from the start. There...Continue Reading
ZABBIX is a 'all-in-on' and 'true opensource' monitoring solution but needs needs improved reporting functionsPowered by IT Central Station
Valuable Features: This software is the most powerfull monitoring tool that I know. Actually since 2005, when I started to work with ZABBIX,...Continue Reading
Powered by IT Central Station
IMO there is no comparison between Nagios and Zabbix. Zabbix wins hands down. Having worked with Zabbix since 1.4 it has evolved into a great...Continue Reading
Manage Information Security Policies, Procedures and Guidelines
Learn to apply best practices and optimize your operations.
Enterprises that succeed in information security share a number of good security habits. Expert Steven Weil reviews the top ten best practices that are essential to success. Continue Reading
Compliance with NIST 800-115 is important for enterprises to maintain while testing systems. Expert Mike Chapple explains the best way to do that. Continue Reading
Incident response management can trip up both government agencies and enterprises alike. Expert Joseph Granneman looks at incident response techniques based on NIST SP 800-61. Continue Reading
Problem Solve Information Security Policies, Procedures and Guidelines Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Joseph Granneman explains the best way for employers to approach social media monitoring as part of a social media policy for employees. Continue Reading
Cloud-based storage introduces a number of risks, but banning these services outright is unlikely to generate the desired results. Continue Reading
Expert Ernie Hayden explains how critical infrastructure organizations can use the NIST cybersecurity framework to assess, improve infosec practices. Continue Reading