
Security automation systems, tools and tactics
Pair cyber insurance, risk mitigation to manage cyber-risk The role of cyber insurance may come after a breach, but it remains a useful element in an organization's vulnerability management strategy.
How do you align an IT risk assessment with COBIT controls?
Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.
ISACA certification, training program targets entry-level security pros
May 9, 2014 · ISACA's new Cybersecurity Nexus offers training and an information security certification path featuring an entry-level certificate that may compete with programs from CompTIA and (ISC)2.
Verizon data breach report shows weak passwords at root of 2011 data ...
Mar 7, 2012 · Hacking and automated attacks made simple by poor password management practices were at the root of most 2011 data breaches, and many firms failed to detect the intrusion, according …
Search Security Resources and Information from TechTarget
News brief: Browser security flaws pose growing risk Forewarned is forearmed, but too many employees don't realize how sophisticated deepfakes have become.
Conficker-infected machines now number 7 million, Shadowserver finds
The Conficker botnet now consists of 7 million Conficker infected machines, according to the Shadowserver Foundation. Investigators hunt for the Conficker authors, but it is increasingly unlikely ...
Information security incident response
AI in risk management: Top benefits and challenges explained AI and machine learning tools can aid in risk management programs.
Find the SIEM platform that fulfills your SIEM requirements
After deciding what your enterprise needs from a security information and event management system, it must find the SIEM platform that best suits these needs. By Adrian Lane, Securosis
Hacker tools and techniques: Underground hacking sites
May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.
TechTarget Deutschland – Deutschsprachiges Informationsnetzwerk ...
Unabhängige Experten bieten Einblicke in führende Technologien Unser Netzwerk aus mehr als 750 unabhängigen Fachautoren und Experten liefert detaillierte, unvoreingenommene Einblicke ...