Security policy News
October 30, 2017
Jeremiah Grossman, chief of security strategy at SentinelOne, talks with SearchSecurity about the value of cyberinsurance and why the rapidly growing market needs to mature.
September 18, 2017
Through Aruba 360 Secure Fabric, partners can tap into the network security capabilities of the vendor's portfolio, which features IntroSpect UEBA and ClearPass technology.
August 11, 2017
Microsoft antivirus policy changes for Windows 10 Fall Creators Update in order to avoid further action in an antitrust case brought by Kaspersky.
July 28, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the series of enterprise data leaks through misconfigured Amazon S3 buckets and what should be done about them.
Security policy Get Started
Bring yourself up to speed with our introductory content
'Swift' and 'automatic': key characteristics of effective incident response. But how to get from where your plan is to where it needs to be? This handbook has the answers. Continue Reading
Effective incident response policies must be detailed, comprehensive and regularly updated -- and then 'embedded in the hearts and minds' of infosec team members. Continue Reading
What does a CISO do in this day and age? The responsibilities of a chief information security officer, the senior executive responsible for an organization's information security program, are growing dramatically. Once relegated to the IT department -- if there was a designated corporate role at all -- the CISO is now often a member of the C-suite team, working alongside the CIO and others, formulating information security strategy and policy with an eye on both security and the business bottom line.
As the volume and sophistication of cyberattacks expand and corporate liability grows -- threatening profits and displeasing shareholders -- CISOs are now tasked with making tough decisions on how tools, systems and training are best used to manage risk. This quarterly supplement to Information Security magazine looks at the state of the CISO role -- how it's changed, where it's heading and what it takes to become an effective CISO in terms of cybersecurity skills, staff support and education.Continue Reading
Evaluate Security policy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
IT departments see the value of collaborating on enterprise network security management as cyberthreats to the network increase. Continue Reading
Shadow IT can be a good thing if users communicate their needs with IT, and administrators listen. But security still needs to be top of mind. Continue Reading
Learn how network access control (NAC), data loss prevention (DLP) and robust data destruction tools secure the data in your corporate endpoints against data loss. Continue Reading
Manage Security policy
Learn to apply best practices and optimize your operations.
Running a private certificate authority can pose significant risks and challenges to meet baseline requirements. Michael Cobb explores what enterprises should know. Continue Reading
A recent patching issue with Flash drew attention to shortcomings with Adobe's HTTP security headers. Judith Myerson discusses the importance of HTTP header security. Continue Reading
It is possible for IT administrators to create a close-to-perfect Windows 10 security setup, as long as they know where to look and what tools to use. Continue Reading
Problem Solve Security policy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Laura Didio of ITIC outlines the top 10 business and procedural must-do steps organizations should take to safeguard the IoT ecosystem and mitigate risk. Continue Reading
Several recent data exposures have involved misconfigured Amazon S3 buckets. Dave Shackleford discusses the importance of proper cloud access control and how to implement it. Continue Reading
Android for Work's sandboxing tools, which split work and personal profiles, can be bypassed with a proof-of-concept attack. Expert Michael Cobb explains how the attack works. Continue Reading