
How do you align an IT risk assessment with COBIT controls?
Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.
Security automation systems, tools and tactics
Pair cyber insurance, risk mitigation to manage cyber-risk The role of cyber insurance may come after a breach, but it remains a useful element in an organization's vulnerability management …
Search Security Resources and Information from TechTarget
News brief: Browser security flaws pose growing risk Forewarned is forearmed, but too many employees don't realize how sophisticated deepfakes have become.
Hacktivism examples: What companies can learn from the HBGary …
In one of the most blatant hactivism examples in recent memory, the group Anonymous compromised the security company HBGary Federal. Learn more about what took place in the …
ISACA certification, training program targets entry-level security pros
May 9, 2014 · ISACA's new Cybersecurity Nexus offers training and an information security certification path featuring an entry-level certificate that may compete with programs from …
Verizon data breach report shows weak passwords at root of 2011 …
Mar 7, 2012 · Hacking and automated attacks made simple by poor password management practices were at the root of most 2011 data breaches, and many firms failed to detect the …
Information security incident response
AI in risk management: Top benefits and challenges explained AI and machine learning tools can aid in risk management programs.
Hacker tools and techniques: Underground hacking sites
May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.
TechTarget Deutschland – Deutschsprachiges …
Unabhängige Experten bieten Einblicke in führende Technologien Unser Netzwerk aus mehr als 750 unabhängigen Fachautoren und Experten liefert detaillierte, unvoreingenommene …
Week 10: Are you throwing out company secrets? (Part 1
In an effort to help busy security managers, CISSP Shelley Bard's weekly column will build upon the concept of the perpetual calendar, offering a schedule of reminders for a proactive, …