About 11 results
Open links in new tab
  1. Security automation systems, tools and tactics

    Pair cyber insurance, risk mitigation to manage cyber-risk The role of cyber insurance may come after a breach, but it remains a useful element in an organization's vulnerability management …

  2. How do you align an IT risk assessment with COBIT controls?

    Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.

  3. How to build a toolset to avoid Web 2.0 security issues

    Learn what to include in a toolset to thwart Web 2.0 security issues like lost productivity, data leaks and increased enterprise risk.

  4. Unpatched vulnerability discovered in Microsoft SQL Server

    Sep 2, 2009 · An unpatched vulnerability in Microsoft SQL Server 2000, 2005 and 2008 has been announced. The flaw exposes user credentials and application credentials stored in memory …

  5. PCI virtualization SIG analysis: Guidance for the cardholder data ...

    The recently released PCI virtualization SIG guidance is intended to address virtualization security concerns in the cardholder data environment. Learn more about what the guidance means for …

  6. What Are Random Numbers and How Are They Used?

    A random number is chosen from a set of numbers, typically using a random number generator. Random numbers are used in cryptography and other applications.

  7. Database Security Management-Enterprise Data Protection

    Learn more about database security gateways, database encryption, issues, threats, software, security gateways, how to detect database vulnerabilities.

  8. Information security incident response

    AI in risk management: Top benefits and challenges explained AI and machine learning tools can aid in risk management programs.

  9. Find the SIEM platform that fulfills your SIEM requirements

    After deciding what your enterprise needs from a security information and event management system, it must find the SIEM platform that best suits these needs. By Adrian Lane, Securosis

  10. Hacker tools and techniques: Underground hacking sites

    May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.