Email Alerts
-
Risk management: Data organization and impact analysis
This first article of the Insider Threat Management Guide explains how to data organization is the first step in implementing insider threat controls. Learning Guide
-
Information Gathering: Port Scanning
This excerpt from Chapter 4 of "Network Security: A Practical Approach," by Jan Harrington examines how port scanning, while useful for troubleshooting network vulnerabilities, can arm crackers with a wealth of information. Book Chapter
-
Owning the C-suite
If you've found yourself on the losing end of a few too many battles, and security is suffering because of a lack of support from top executives, a bit of positive social engineering may be just the thing. Information Security maga
-
A Business Guide to Information Security: Threats and Compliance
In this excerpt from Chapter 1 of A Business Guide to Information Security, author Alan Calder identifies six future risks to information security and explains how they will affect individuals and organizations. Book Chapter
-
Multi-dimensional enterprise-wide security: Corporate reputation
Learn how to protect information assets and resources within all areas of the enterprise and in compliance with all regulatory, policy and contractual requirements. 10 Tips in 10 Minutes
-
Multi-dimensional enterprise-wide security: Divide and conquer
Learn how to protect information assets and resources within all areas of the enterprise and in compliance with all regulatory, policy and contractual requirements. 10 Tips in 10 Minutes
-
Managing Human Resources: Termination Procedures
In this excerpt from Chapter 6 of The Little Black Book of Computer Security, author Joel Dubin provides an outline of security measures to take when terminating an employee. Book Chapter
-
Spy vs. Spy
Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. Book Chapter
-
Combining technology and social engineering: Hacking behind bars
In this excerpt from Chapter 11 of "The Art of Deception: Controlling the Human Element of Security," authors Kevin Mitnick and William L. Simon begin a story that shows how social engineering can be used with technology. Reprint
-
Learning about Security Threats: Profiling
A look at what it means to be a hacker. Reprint
Security Management Strategies for the CIO