Topics
Content Types
About 25 results
-
The emergence of enterprise risk compliance
At the intersection of IT compliance and risk, new solutions are helping security professionals to prioritize where limited resources need to be directed.
-
Band of brothers: Vendor partnerships strengthen security for all
Security vendors who band together on solutions instead of persisting in adversarial relationships with one another should be the favored providers for IT departments.
-
Be wary of WordPress plugin vulnerabilities
WordPress plugins are highly vulnerable, according to a recent report.
-
How to successfully implement the principle of least privilege
Least privilege is a core security principle, but it's one that often meets with resistance by users. Here are tips for how to implement it and get the point across to others.
-
Mission impossible: Data identification and prioritization
Protecting your organization's most precious data is the goal, but not all data needs the same degree of care. Thinking strategically about what is most valuable can help you focus...
-
Running the gauntlet: Tips for achieving your CISSP
One of the most highly regarded security certifications is the CISSP. Dominic Vogel offers these nine tips for becoming certified based on his own experience.
-
Ask potential cloud vendors these 10 security questions
Dominic Vogel offers his list of ten questions you should be asking cloud vendors about their security practices. Make sure you get the proof to back up their claims.
-
Governance, risk, compliance: Four things to ponder about GRC initiatives
Dominic Vogel highlights four issues to consider if your organization is adopting a GRC framework to manage security and compliance requirements.
-
Governance, risk, and compliance: Change auditing and security
Dominic Vogel takes a look at GRC software that provides change auditing functionality for organizations to meet governance, risk, and compliance goals. Here, he chats with a rep f...
-
Application shielding: Exploring ExploitShield
Dominic Vogel talks to the CEO of ExploitShield to find out more about what is meant by "application shielding" technology and how it fits in with other security mechanisms.
-
Short and pithy IT security tips for users
Dominic Vogel came up with 10 short security tips for users that he thinks will do the most good without overwhelming them with too much information.
-
Five-minute security: The elevator pitch
Dominic Vogel says that it's wrong to give up on instilling security awareness in users, but skipping the jargon and getting back to simple common sense is the key.
-
Bromium: Newcomer to the periodic table of security elements
Dominic Vogel looks into a new security solution that relies on micro-virtualization to isolate untrustworthy desktop tasks from enterprise networks.
-
How to start your career as a security pro
Dominic Vogel offers some tips for getting starting in the information security field whether you're just starting out or looking to make a career change.
-
Security pros: Knowing when it's time to move on (and how to do it)
Dominic Vogel draws on his recent experience to offer advice on job-changing strategies to security pros and others in IT when you realize it's time to recharge your career.
-
How user-behavior monitoring helps reduce risk
Dominic Vogel asks a researcher and a vendor to explain what behavioral monitoring adds to an organization's security strategy.
-
Putting passwords out to pasture: Identity behaviour vs. identity authentication
Dominic Vogel writes that the days of relying on passwords, strong or otherwise, is an outdated security practice. What's the next step?
-
IT security strategies for mitigating web-based risks
Dominic Vogel offers some tips on mitigating web-based threats. What works and what doesn't in the fight against malware?
-
Insidious insiders: Psychology provides clues in handling invisible threats
Dominic Vogel considers the insider threat risk in organizations and suggests that cross-departmental collaboration could help shore up data loss prevention methods.
-
Hitting Windows 8 reset button: Security bonus saves time and money
Dominic Vogel makes his pitch for the Windows 8 reset button from a security perspective.