Information security program management
CISOs and information security programs are vital to protecting enterprises against today's cyber threats. In this resource centers, get the latest news and advice about CISO practices, infosec prrogram management and more.
New & Notable
Information security program management News
-
July 15, 2015
15
Jul'15
IEEE group advocates random MAC addresses for Wi-Fi security
An IEEE group advocates random MAC addresses for increased Wi-Fi security, while networking pros say enterprise security isn't strong enough for moving applications to the cloud.
-
March 13, 2012
13
Mar'12
Information security roles and the cloud
How will security pros’ jobs change as cloud use grows?
-
March 01, 2012
01
Mar'12
More than hype: Security big data helps bank to boost security program
At RSA Conference 2012, Zions Bancorporation detailed how it harvested security big data using a Hadoop-based security data warehouse.
-
December 21, 2005
21
Dec'05
Compliance gets more expensive for IT budgets
New study shows IT spending has increased in order to keep pace with the growing demands of Sarbanes-Oxley and other regulations. Analysts predict that this may lead to the canceling of other projects.
Information security program management Get Started
Bring yourself up to speed with our introductory content
-
How to build a zero-trust network in these 4 steps
While network teams are largely responsible for deploying the elements of a zero-trust network, security teams should also be involved in developing the overall zero-trust framework. Continue Reading
-
Five essential network security topics and trends to watch
With a constant drumbeat of security and data breaches in 2015, it's no wonder networking pros have questions and concerns about network security topics. These five stats can get you started. Continue Reading
-
How to manage security risks in vendor contracts
Financial institutions face numerous regulatory requirements for managing vendor risk. Learn what financial firms need to include in their vendor contracts in order to conform with regulatory guidance and industry best practices for vendor risk ... Continue Reading
Evaluate Information security program management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Convergence of security and network management has pros and cons
With security integration once again becoming a hot topic, security teams are finding themselves being merged with other operational groups, such as network management. In this tip, Mike Rothman writes why that convergence may or may not be a bad ... Continue Reading