Übung macht den Incident-Response-Meister. Foto: GaudiLab - shutterstock.comDie Bedrohungslage entschärft sich bekanntermaßen nie - umso wichtiger ist es, dass Sicherheitsentscheider und ihre Teams nicht in eine Schockstarre verfallen...
Mantraps, access control systems, bollards and surveillance. Your step-by-step guide to securing the data center against physical threats and intrusions.
Supercharge your team, deliver more business value, identify better metrics, and so much more. A collection of practical ideas from leading CSOs and CISOs.
Executive Guide PDF provides BC/DR practicals
Definitions, challenges, and implementation tips from the trenches. [PDF]
Six-part set of articles takes 360-degree look at the implications of new laws that require organizations to notify people whose personal information has been compromised
A new Moody’s service aims to create the security world’s equivalent of Aaa to C ratings, replacing the need for companies to do vendor assessments. But it will only work if enough companies sign up.
Encryption tools in ’Mujahedeen Secrets 2’ show a software development lifecycle with increasing level of sophistication, Jeff Bardin says
Sure, LinkedIn and Facebook present security, privacy and productivity challenges. But if the sites are so bad, then why have so many security and privacy leaders joined them?