Security mgmt practices News
June 30, 2017
At Microsoft, digital transformation is getting an assist from five consulting firms in its newly launched Microsoft Customer Engagement Alliance program; more news from the week.
October 16, 2013
In this ISSA conference recap, we look at security roadmap development, identity systems, and the link between government and corporate cybersecurity.
September 12, 2013
The Cisco services business created a Services Security Practice and installed former Boeing security executive Bryan Palma to lead the venture.
September 15, 2004
Security School is a series of 10 webcasts, quizzes and extra detailed notes focused on the CISSP's Common Body of Knowledge to help security practitioners studying for the CISSP exam.
Security mgmt practices Get Started
Bring yourself up to speed with our introductory content
Setting up a SOC is different for every enterprise, but there are some fundamental steps with which to start. Expert Steven Weil outlines the basics for a security operations center. Continue Reading
Many providers have changed business strategies to accommodate the meaningful use program. The lack of resolution about stage 3 has left some of their plans in limbo. Continue Reading
Evaluate Security mgmt practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Vodafone's Andrew Morawski explores five key internet of things trends business leaders and IT teams should consider in the coming year. Continue Reading
IT organizations hear plenty of myths about isolation and security when they compare containerization vs. virtualization. One DevOps and containerization consultant sets the record straight in this podcast. Continue Reading
As IT teams become tasked to manage connected devices more often, what steps need to be taken to avoid performance and security-related problems? Continue Reading
Manage Security mgmt practices
Learn to apply best practices and optimize your operations.
Multivendor security system management can be challenging, but getting it right can help your enterprise reap the benefits these systems offer. Continue Reading
Use the recent rash of high-profile data breaches as examples of what not to do in your Exchange environment. Continue Reading
In this CISSP Essential Security School lesson, learn about security management practices for securing information and assets. Continue Reading
Problem Solve Security mgmt practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Speed-to-market strategies shouldn't be bogged down by IT security. Here are two steps that will help CISOs adapt governance practices to support IT speed. Continue Reading
While U.S. hospitals were relatively unscathed by the WannaCry ransomware attack, healthcare organizations would be wise to review and update their security tools and practices. Continue Reading
In an era of security app sprawl, a unified security management framework could be the best way to corral security tools and ensure network integrity. Continue Reading