Information Systems Security Association

Displaying 1-2 of 2 results

  • White Papers // Oct 2010

    A Phased Approach to Reviewing Cloud Computing Risks

    Cloud computing has the potential to disrupt information technology service delivery. It brings seemingly unlimited potential, along with many unknown risks. Organizations are proceeding with caution when considering how to leverage cloud-based services. This paper discusses a process for evaluating cloud computing, and provides organizations with a blueprint for launching...

    Provided By Information Systems Security Association

  • White Papers // Feb 2009

    Your Browser Wears No Clothes: Why Fully Patched Browsers Remain Vulnerable

    As users of technology, it has been taught that the Internet is not always a safe place but that it can protect ourselves by patching and hardening systems. While patch management and system hardening have long been the basics for enterprise security, shifts in technology and attack patterns are changing...

    Provided By Information Systems Security Association

  • White Papers // Feb 2009

    Your Browser Wears No Clothes: Why Fully Patched Browsers Remain Vulnerable

    As users of technology, it has been taught that the Internet is not always a safe place but that it can protect ourselves by patching and hardening systems. While patch management and system hardening have long been the basics for enterprise security, shifts in technology and attack patterns are changing...

    Provided By Information Systems Security Association

  • White Papers // Oct 2010

    A Phased Approach to Reviewing Cloud Computing Risks

    Cloud computing has the potential to disrupt information technology service delivery. It brings seemingly unlimited potential, along with many unknown risks. Organizations are proceeding with caution when considering how to leverage cloud-based services. This paper discusses a process for evaluating cloud computing, and provides organizations with a blueprint for launching...

    Provided By Information Systems Security Association