Security mgmt practices News
June 30, 2017
At Microsoft, digital transformation is getting an assist from five consulting firms in its newly launched Microsoft Customer Engagement Alliance program; more news from the week.
October 16, 2013
In this ISSA conference recap, we look at security roadmap development, identity systems, and the link between government and corporate cybersecurity.
September 12, 2013
The Cisco services business created a Services Security Practice and installed former Boeing security executive Bryan Palma to lead the venture.
September 15, 2004
Security School is a series of 10 webcasts, quizzes and extra detailed notes focused on the CISSP's Common Body of Knowledge to help security practitioners studying for the CISSP exam.
Security mgmt practices Get Started
Bring yourself up to speed with our introductory content
Setting up a SOC is different for every enterprise, but there are some fundamental steps with which to start. Expert Steven Weil outlines the basics for a security operations center. Continue Reading
Many providers have changed business strategies to accommodate the meaningful use program. The lack of resolution about stage 3 has left some of their plans in limbo. Continue Reading
Evaluate Security mgmt practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As IT teams become tasked to manage connected devices more often, what steps need to be taken to avoid performance and security-related problems? Continue Reading
Amazon Alexa, the voice interface that powers Amazon Echo, has security and management limitations that hinder its enterprise growth. But the future still looks bright. Continue Reading
The IIC has published a technical security framework intended to guide companies toward cybersecurity in the age of IoT. Here's what manufacturers should know. Continue Reading
Manage Security mgmt practices
Learn to apply best practices and optimize your operations.
Multivendor security system management can be challenging, but getting it right can help your enterprise reap the benefits these systems offer. Continue Reading
Use the recent rash of high-profile data breaches as examples of what not to do in your Exchange environment. Continue Reading
In this CISSP Essential Security School lesson, learn about security management practices for securing information and assets. Continue Reading
Problem Solve Security mgmt practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
While U.S. hospitals were relatively unscathed by the WannaCry ransomware attack, healthcare organizations would be wise to review and update their security tools and practices. Continue Reading
In an era of security app sprawl, a unified security management framework could be the best way to corral security tools and ensure network integrity. Continue Reading
While mobile security is a challenge, file sync-and-share products and mobile device management software can help protect your organization's vulnerable data. Continue Reading