Topics
Content Types
About 25 results
-
The emergence of enterprise risk compliance
At the intersection of IT compliance and risk, new solutions are helping security professionals to prioritize where limited resources need to be directed.
-
Band of brothers: Vendor partnerships strengthen security for all
Security vendors who band together on solutions instead of persisting in adversarial relationships with one another should be the favored providers for IT departments.
-
Be wary of WordPress plugin vulnerabilities
WordPress plugins are highly vulnerable, according to a recent report.
-
How to successfully implement the principle of least privilege
Least privilege is a core security principle, but it's one that often meets with resistance by users. Here are tips for how to implement it and get the point across to others.
-
Mission impossible: Data identification and prioritization
Protecting your organization's most precious data is the goal, but not all data needs the same degree of care. Thinking strategically about what is most valuable can help you focus...
-
Running the gauntlet: Tips for achieving your CISSP
One of the most highly regarded security certifications is the CISSP. Dominic Vogel offers these nine tips for becoming certified based on his own experience.
-
Ask potential cloud vendors these 10 security questions
Dominic Vogel offers his list of ten questions you should be asking cloud vendors about their security practices. Make sure you get the proof to back up their claims.
-
Governance, risk, compliance: Four things to ponder about GRC initiatives
Dominic Vogel highlights four issues to consider if your organization is adopting a GRC framework to manage security and compliance requirements.
-
Governance, risk, and compliance: Change auditing and security
Dominic Vogel takes a look at GRC software that provides change auditing functionality for organizations to meet governance, risk, and compliance goals. Here, he chats with a rep f...
-
Application shielding: Exploring ExploitShield
Dominic Vogel talks to the CEO of ExploitShield to find out more about what is meant by "application shielding" technology and how it fits in with other security mechanisms.