Email Alerts
-
What vendors would you recommend for software write-blockers?
In a forensics investigation, a software write-blocker can be very helpful. But which vendors offer the best blockers? Security management expert Mike Rothman explains what to look for. Ask the Expert
-
Is there a market for standalone antivirus products?
In this SearchSecurity.com Q&A, Ed Skoudis says that there is still a market opportunity for standalone antivirus products -- but the window is shrinking. Ask the Expert
-
What are the security risks of a corporate divestiture?
Security management expert Mike Rothman discusses the data protection issues involved with a corporate divestiture . Ask the Expert
-
Will Web application security vendor mergers help buyers?
To meet the growing sophistication of Internet threats, security solution providers are feeling pressured to expand their application infrastructures. Michael Cobb explains how an overcrowded Web application security sector means better deals for cus... Ask the Expert
-
Can a vendor be convinced to add security to its application development process?
In this expert response, security management pro Mike Rothman unveils several ways in which organizations can influence vendors to make security a bigger priority in the application development life cycle. Ask the Expert
-
What is the average cost of an MSSP?
Looking to find the startup and maintenance costs of an MSSP? In this Ask the Expert Q&A, application security expert, Michael Cobb outlines the key issues for businesses to consider when examining managed security arrangements. Ask the Expert
-
What's the difference between an outsourcing agreement and a service-level agreement?
What's the difference between an outsourcing agreement and a service-level agreement? If they are different, what are the defining elements of each? Ask the Expert
-
Getting started in security on a tight budget
Ask the Expert
-
Types of integrated security products and their hazards
Ask the Expert
-
Who makes security purchasing decisions
Ask the Expert
Security Management Strategies for the CIO