Configuration management

Security risk management News

  • April 25, 2016 25 Apr'16

    HIPAA audit protocol signals audit process underway

    As it prepares to launch audits of healthcare organizations and their business associates, OCR issues audit protocol as a guide to compliance with HIPAA security and privacy rules.

  • April 08, 2016 08 Apr'16

    Vulnerability branding becomes another marketing tool

    Vulnerability branding was once a practice that elevated understanding of flaws and potentially led to better remediation, but now serves as little more than marketing for security researchers.

  • March 29, 2016 29 Mar'16

    DOJ finds successful iPhone crack; drops backdoor bid, for now

    The DOJ found a successful iPhone crack to access the San Bernardino, Calif., terrorist's device and dropped the pending legal action against Apple, but only in that one case.

  • March 25, 2016 25 Mar'16

    HIPAA audits and their discontents

    Now that it appears the long-awaited HIPAA audits of healthcare organizations and their business associates are actually starting, it's worth noting that not everyone is thrilled about the ...

View All News

Security risk management Get Started

Bring yourself up to speed with our introductory content

  • Information Governance and Security: Protecting and Managing Your Company's Proprietary

    In this excerpt of Information Governance and Security, authors John G. Iannarelli and Michael O'Shaughnessy offer tips for establishing guidelines for all departments or sectors of a business. Continue Reading

  • What are the best risk assessment frameworks?

    A recent survey indicated an increased use of risk assessment frameworks among enterprises. Here's why it's important to choose the right framework for your organization. Continue Reading

  • How to achieve secure file sync and share

    Enterprise file synchronization and sharing, also known as corporate sync and share, or even just EFSS, lets users to place their files either in the cloud or in on-premises storage, allowing them to access the files wherever they go, by means of either desktop computers or mobile devices. The benefits of EFSS are clear, considering how today's workforce is often on the go, working while traveling or at home as well as in the office. But the security concerns are high.

    This three-part technical guide considers EFSS from three angles. First it considers how business demand for the secure file sync-and-share service has affected vendor products. Next it considers the many consumer-based file sync-and-share products available and whether they can be secured in the enterprise. Finally, this guide presents detailed and actionable advice on how to deploy a new EFSS tool in the enterprise.

    By absorbing the information in this guide, readers will get up to speed on how to securely sync and share enterprise files.

     Continue Reading

View All Get Started

Evaluate Security risk management Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Security risk management

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security risk management Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close