Information security education for IT Professionals

Security Awareness Training and Internal Threats-Information

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Risk management: Data organization and impact analysis

    This first article of the Insider Threat Management Guide explains how to data organization is the first step in implementing insider threat controls. 

  • Information Gathering: Port Scanning

    This excerpt from Chapter 4 of "Network Security: A Practical Approach," by Jan Harrington examines how port scanning, while useful for troubleshooting network vulnerabilities, can arm crackers with a wealth of information. 

  • Owning the C-suite

    If you've found yourself on the losing end of a few too many battles, and security is suffering because of a lack of support from top executives, a bit of positive social engineering may be just the thing. 

  • A Business Guide to Information Security: Threats and Compliance

    In this excerpt from Chapter 1 of A Business Guide to Information Security, author Alan Calder identifies six future risks to information security and explains how they will affect individuals and organizations. 

  • Multi-dimensional enterprise-wide security: Corporate reputation

    Learn how to protect information assets and resources within all areas of the enterprise and in compliance with all regulatory, policy and contractual requirements. 

  • Multi-dimensional enterprise-wide security: Divide and conquer

    Learn how to protect information assets and resources within all areas of the enterprise and in compliance with all regulatory, policy and contractual requirements. 

  • Managing Human Resources: Termination Procedures

    In this excerpt from Chapter 6 of The Little Black Book of Computer Security, author Joel Dubin provides an outline of security measures to take when terminating an employee. 

  • Spy vs. Spy

    Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. 

  • Combining technology and social engineering: Hacking behind bars

    In this excerpt from Chapter 11 of "The Art of Deception: Controlling the Human Element of Security," authors Kevin Mitnick and William L. Simon begin a story that shows how social engineering can be used with technology. 

  • Learning about Security Threats: Profiling

    A look at what it means to be a hacker.