About 13 results
Open links in new tab
  1. Whitelisting: Filtering for advanced malware prevention

    Learn how enterprise whitelisting filtering technology can be an effective tactic for filtering advanced malware attacks against enterprise endpoints.

  2. Hacktivism examples: What companies can learn from the HBGary …

    In one of the most blatant hactivism examples in recent memory, the group Anonymous compromised the security company HBGary Federal. Learn more about what took place in the …

  3. How to perform a third-party risk assessment for compliance

    Conducting a third-party risk assessment is essential for organizations with business partners and that fall under compliance regulations such as PCI DSS, HIPAA and Sarbanes-Oxley. Learn …

  4. How to build a toolset to avoid Web 2.0 security issues

    Learn what to include in a toolset to thwart Web 2.0 security issues like lost productivity, data leaks and increased enterprise risk.

  5. How do you align an IT risk assessment with COBIT controls?

    Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.

  6. ISACA certification, training program targets entry-level security pros

    May 9, 2014 · ISACA's new Cybersecurity Nexus offers training and an information security certification path featuring an entry-level certificate that may compete with programs from …

  7. Unpatched vulnerability discovered in Microsoft SQL Server

    Sep 2, 2009 · An unpatched vulnerability in Microsoft SQL Server 2000, 2005 and 2008 has been announced. The flaw exposes user credentials and application credentials stored in memory …

  8. Search Security Resources and Information from TechTarget

    Security information and event management has evolved significantly since it was first introduced 20 years ago. Today's SIEMs offer a wide range of capabilities.

  9. Hacker tools and techniques: Underground hacking sites

    May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.

  10. Ponemon study finds the cost of data breaches increasing

    Mar 8, 2011 · The costly toll enterprises pay when data breaches occur is rising, according to the latest research issued by The Ponemon Institute.