Unified communications

Security training News

View All News

Security training Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Security training Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Security training

Learn to apply best practices and optimize your operations.

  • For secure medical imaging systems, end-user awareness a must

    Consultant Nick Merkin explains why a lack of security awareness is a threat to protecting medical imaging systems and how organizations can educate staff to mitigate risks. Continue Reading

  • Insider security threats: What CISOs can do to mitigate them

    Dealing with insider security threats requires a combination of tactics. Expert Mike O. Villegas discusses the various aspects of insider threat mitigation strategies. Continue Reading

  • Cloud governance model still behind services

    A lot of the cloud adoption in organizations has happened in an organic fashion with little to no IT involvement and even less policy oversight. In most cases, the security, policy and cloud governance model you implement will be somewhat retroactive in nature, says Chris Pogue, CISO at Nuix.

    Among the challenges in these environments is a lack of standards for evaluating a vendor's risk management and cloud governance model. This month, Information Security magazine looks at steps to help security professionals gain more insight when employees are migrating critical applications and data to the cloud.

    Evaluating the security postures of cloud providers, vendors and business partners is a constant dance with the details. Security professionals need specific information that they may not get. We look at enterprise security ratings services akin to what Equifax, Experian and TransUnion do in the financial sector to provide credit ratings for individual consumers. Although the security ratings services are just starting to emerge, these reporting tools may offer another view into the security postures of third parties, and in the board room.

    Farsight Security CEO Paul Vixie joins us to discuss the latest research on threats to domain name systems. As talk of digital transformation continues, internet security and cloud governance models will remain top of mind for executives. "Now, IT is the big risk, and we are not looking at the old risks anymore now that the internet has connected everybody to everybody," Vixie says.

     Continue Reading

View All Manage

Problem Solve Security training Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close