About 13 results
Open links in new tab
  1. How do you align an IT risk assessment with COBIT controls?

    Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.

  2. Security automation systems, tools and tactics

    Pair cyber insurance, risk mitigation to manage cyber-risk The role of cyber insurance may come after a breach, but it remains a useful element in an organization's vulnerability management …

  3. Search Security Resources and Information from TechTarget

    News brief: Browser security flaws pose growing risk Forewarned is forearmed, but too many employees don't realize how sophisticated deepfakes have become.

  4. Hacktivism examples: What companies can learn from the HBGary …

    In one of the most blatant hactivism examples in recent memory, the group Anonymous compromised the security company HBGary Federal. Learn more about what took place in the …

  5. ISACA certification, training program targets entry-level security pros

    May 9, 2014 · ISACA's new Cybersecurity Nexus offers training and an information security certification path featuring an entry-level certificate that may compete with programs from …

  6. Verizon data breach report shows weak passwords at root of 2011 …

    Mar 7, 2012 · Hacking and automated attacks made simple by poor password management practices were at the root of most 2011 data breaches, and many firms failed to detect the …

  7. Information security incident response

    AI in risk management: Top benefits and challenges explained AI and machine learning tools can aid in risk management programs.

  8. Hacker tools and techniques: Underground hacking sites

    May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.

  9. TechTarget Deutschland – Deutschsprachiges …

    Unabhängige Experten bieten Einblicke in führende Technologien Unser Netzwerk aus mehr als 750 unabhängigen Fachautoren und Experten liefert detaillierte, unvoreingenommene …

  10. Week 10: Are you throwing out company secrets? (Part 1

    In an effort to help busy security managers, CISSP Shelley Bard's weekly column will build upon the concept of the perpetual calendar, offering a schedule of reminders for a proactive, …