Information security program management
CISOs and information security programs are vital to protecting enterprises against today's cyber threats. In this resource centers, get the latest news and advice about CISO practices, infosec prrogram management and more.
Go Now: Malware Protection Best Practices
Should security teams clean up the malware and move on or format the hard drives to start over with a clean system? In this expert guide, security pros weigh in on how antimalware protects the enterprise.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Information security program management News
-
July 21, 2017
21
Jul'17
Dark web markets shutdown may lead to more arrests
Cooperation between law enforcement from around the world led to the shutdown of AlphaBay and Hansa dark web markets and potential leads of illegal vendors.
-
July 21, 2017
21
Jul'17
Bipartisan group launches effort to improve election security
News roundup: The Defending Digital Democracy project brings together security experts to tackle election security. Plus, government shake-ups could hit cybersecurity, and more.
-
July 19, 2017
19
Jul'17
Risk & Repeat: Kaspersky Lab removed from GSA Schedule 70
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Trump administration's removal of Kaspersky Lab from the GSA Schedule 70 for federal IT contracts.
-
June 26, 2017
26
Jun'17
Security code reviews by Russian agencies cause concern
Demands for security code reviews by Russia have been on the rise, and not all experts or U.S. companies want to comply with the requests.
Information security program management Get Started
Bring yourself up to speed with our introductory content
-
IT security governance fosters a culture of shared responsibility
Effective information security governance programs require a partnership between executive leadership and IT. All parties work toward a common goal of protecting the enterprise. Continue Reading
-
black hat
Black hat refers to a hacker who breaks into a computer system or network with malicious intent. Continue Reading
-
Acquiring cybersecurity insurance: Why collaboration is key
Cybersecurity insurance is becoming more important to enterprises as threats increase. Sean Martin explains why enterprise departments need to work together to acquire it. Continue Reading
Evaluate Information security program management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Applying cybersecurity readiness to today's enterprises
How prepared is your organization for a cyberattack? Expert Peter Sullivan outlines the seven steps enterprises need to take in order to achieve cybersecurity readiness. Continue Reading
-
Why security incident management is paramount for enterprises
Enterprises aren't truly prepared for cyber threats unless they have proper security incident management in place. Expert Peter Sullivan explains what enterprises need to know. Continue Reading
-
Threat hunting defined: What you need to know about this emerging area
In this video, David Bianco, technology advisor at Sqrrl, describes the key objectives of the emerging threat hunter role in enterprise cybersecurity organizations. Continue Reading
Manage Information security program management
Learn to apply best practices and optimize your operations.
-
As privacy requirements evolve, CISSPs must stay informed
Just as technology constantly changes, so too do the laws and regulations that govern data privacy. CISSPs must remain aware of their organization's individual requirements. Continue Reading
-
Information privacy and security requires a balancing act
Maintaining information privacy and security seem to be separate challenges, but in reality, each is integral to the other. Expert Kevin Beaver explains how to work toward both. Continue Reading
-
Cybersecurity products: Channel, clients look for better integration
Channel partners, dealing with an industry rife with IT security product sets, are looking into integrated security architectures and doing some of their own integration work. Continue Reading
Problem Solve Information security program management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
How intelligence data leaks caused collateral damage for infosec
Alvaka Networks' Kevin McDonald looks at the real-world damage caused by data leaks at the CIA and NSA, which have put dangerous government cyberweapons in the hands of hackers Continue Reading
-
Why the citizen developer trend is bugging infosec teams
Automated tools are making it easier for citizen developers to build and deploy applications quickly. But is that a good thing for enterprise security teams? Continue Reading
-
How does USB Killer v3 damage devices through their USB connections?
USB Killer devices, with the ability to destroy systems via a USB input, are available and inexpensive. Expert Nick Lewis explains how they work and how to defend against this threat. Continue Reading