Features
Features
Risk assessments, metrics and frameworks
-
Bruce Schneier 'Beyond Fear': Searching for rational security
In his new book, "Beyond Fear," Bruce Schneier advocates measuring risks and applying rational security. Continue Reading
-
Risk and trust
Here are generic questions that can be used to assess risk and establish a baseline. Continue Reading
-
Firewall checkup: Testing your firewall's health
Uncover six important steps for testing your firewall to make sure it is running safely and smoothly. Continue Reading
-
Identifying new approaches to risk management
Infosec specialists need to adapt to the changing executive environment and evolving approaches to risk management. Continue Reading
-
Using decision-tree modeling to determine paths of attack
Learn how one startup leverages decision-tree modeling to identify unwanted outcomes. Continue Reading
-
SRP evaluation criteria: Tools to enable security as a process
We evaluated three security resource planning (SRP) products based on this list of key criteria. Continue Reading
-
IT risk assessment: Using security resource planning products to improve
Enterprise risk management is a delicate balancing act. A look at three "security resource planning" products that seek to bring order to the process. Continue Reading
-
Who's who in IT risk management vendors 2003
Several IT risk management vendors market products and services that target parts of the enterprise risk management process. Continue Reading
-
The security risk management lifecycle framework
Learn about the seven steps in the enterprise information security risk management lifecycle framework. Continue Reading
-
Roundtable: Practical strategies for enterprise-wide risk management
Four CISOs explore practical strategies for managing enterprise risk-from classification to assessment to monitoring to response. Continue Reading
-
Your're caught: Examining punsihment for cybercrime
The Trippin Smurfs hacker gang chose the wrong day to deface NASA. Continue Reading
-
Vulnerability scanners: Not the best tools for network perimeter defense
Vulnerability scanners prove mediocre tools for helping IDSes protect the network perimeter. Continue Reading
-
Conducting an effective business impact analysis
Learn how to conduct a business impact analysis as part of a disaster-recovery plan. Continue Reading