
Whitelisting: Filtering for advanced malware prevention
Learn how enterprise whitelisting filtering technology can be an effective tactic for filtering advanced malware attacks against enterprise endpoints.
Hacktivism examples: What companies can learn from the HBGary …
In one of the most blatant hactivism examples in recent memory, the group Anonymous compromised the security company HBGary Federal. Learn more about what took place in the …
How to perform a third-party risk assessment for compliance
Conducting a third-party risk assessment is essential for organizations with business partners and that fall under compliance regulations such as PCI DSS, HIPAA and Sarbanes-Oxley. Learn …
How to build a toolset to avoid Web 2.0 security issues
Learn what to include in a toolset to thwart Web 2.0 security issues like lost productivity, data leaks and increased enterprise risk.
How do you align an IT risk assessment with COBIT controls?
Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.
ISACA certification, training program targets entry-level security pros
May 9, 2014 · ISACA's new Cybersecurity Nexus offers training and an information security certification path featuring an entry-level certificate that may compete with programs from …
Unpatched vulnerability discovered in Microsoft SQL Server
Sep 2, 2009 · An unpatched vulnerability in Microsoft SQL Server 2000, 2005 and 2008 has been announced. The flaw exposes user credentials and application credentials stored in memory …
Search Security Resources and Information from TechTarget
Security information and event management has evolved significantly since it was first introduced 20 years ago. Today's SIEMs offer a wide range of capabilities.
Hacker tools and techniques: Underground hacking sites
May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.
Ponemon study finds the cost of data breaches increasing
Mar 8, 2011 · The costly toll enterprises pay when data breaches occur is rising, according to the latest research issued by The Ponemon Institute.