About 9 results
Open links in new tab
  1. Information security incident response

    AI in risk management: Top benefits and challenges explained AI and machine learning tools can aid in risk management programs.

  2. How to perform a third-party risk assessment for compliance

    Conducting a third-party risk assessment is essential for organizations with business partners and that fall under compliance regulations such as PCI DSS, HIPAA and Sarbanes-Oxley. Learn …

  3. How do you align an IT risk assessment with COBIT controls?

    Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.

  4. Ponemon study finds the cost of data breaches increasing

    Mar 8, 2011 · The costly toll enterprises pay when data breaches occur is rising, according to the latest research issued by The Ponemon Institute.

  5. Hacker tools and techniques: Underground hacking sites

    May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.

  6. Find the SIEM platform that fulfills your SIEM requirements

    After deciding what your enterprise needs from a security information and event management system, it must find the SIEM platform that best suits these needs. By Adrian Lane, Securosis

  7. Security Bytes: Winamp, Samba flaws fixed; man wanted for hiring …

    Aug 31, 2004 · Winamp flaw fixed Winamp users "must upgrade to Winamp 5.05 immediately" to patch a hole that would allow a zero-day exploit circulating in the wild to "forcefully install …

  8. Week 10: Are you throwing out company secrets? (Part 1

    In an effort to help busy security managers, CISSP Shelley Bard's weekly column will build upon the concept of the perpetual calendar, offering a schedule of reminders for a proactive, …

  9. Preventing Data Theft, Combating Internal Threats

    Jan 1, 2006 · Discover how to protect sensitive data and prevent internal threats and hacker attacks with several methods such as encryption and employee monitoring.