About 12 results
Open links in new tab
  1. Security automation systems, tools and tactics

    Pair cyber insurance, risk mitigation to manage cyber-risk The role of cyber insurance may come after a breach, but it remains a useful element in an organization's vulnerability management strategy.

  2. How do you align an IT risk assessment with COBIT controls?

    Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.

  3. ISACA certification, training program targets entry-level security pros

    May 9, 2014 · ISACA's new Cybersecurity Nexus offers training and an information security certification path featuring an entry-level certificate that may compete with programs from CompTIA and (ISC)2.

  4. Verizon data breach report shows weak passwords at root of 2011 data ...

    Mar 7, 2012 · Hacking and automated attacks made simple by poor password management practices were at the root of most 2011 data breaches, and many firms failed to detect the intrusion, according …

  5. Search Security Resources and Information from TechTarget

    News brief: Browser security flaws pose growing risk Forewarned is forearmed, but too many employees don't realize how sophisticated deepfakes have become.

  6. Conficker-infected machines now number 7 million, Shadowserver finds

    The Conficker botnet now consists of 7 million Conficker infected machines, according to the Shadowserver Foundation. Investigators hunt for the Conficker authors, but it is increasingly unlikely ...

  7. Information security incident response

    AI in risk management: Top benefits and challenges explained AI and machine learning tools can aid in risk management programs.

  8. Find the SIEM platform that fulfills your SIEM requirements

    After deciding what your enterprise needs from a security information and event management system, it must find the SIEM platform that best suits these needs. By Adrian Lane, Securosis

  9. Hacker tools and techniques: Underground hacking sites

    May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.

  10. TechTarget Deutschland – Deutschsprachiges Informationsnetzwerk ...

    Unabhängige Experten bieten Einblicke in führende Technologien Unser Netzwerk aus mehr als 750 unabhängigen Fachautoren und Experten liefert detaillierte, unvoreingenommene Einblicke ...