Topics
Content Types
About 25 results
-
The emergence of enterprise risk compliance
At the intersection of IT compliance and risk, new solutions are helping security professionals to prioritize where limited resources need to be directed.
-
Band of brothers: Vendor partnerships strengthen security for all
Security vendors who band together on solutions instead of persisting in adversarial relationships with one another should be the favored providers for IT departments.
-
Be wary of WordPress plugin vulnerabilities
WordPress plugins are highly vulnerable, according to a recent report.
-
How to successfully implement the principle of least privilege
Least privilege is a core security principle, but it's one that often meets with resistance by users. Here are tips for how to implement it and get the point across to others.
-
Mission impossible: Data identification and prioritization
Protecting your organization's most precious data is the goal, but not all data needs the same degree of care. Thinking strategically about what is most valuable can help you focus...
-
Running the gauntlet: Tips for achieving your CISSP
One of the most highly regarded security certifications is the CISSP. Dominic Vogel offers these nine tips for becoming certified based on his own experience.
-
Ask potential cloud vendors these 10 security questions
Dominic Vogel offers his list of ten questions you should be asking cloud vendors about their security practices. Make sure you get the proof to back up their claims.
-
Governance, risk, compliance: Four things to ponder about GRC initiatives
Dominic Vogel highlights four issues to consider if your organization is adopting a GRC framework to manage security and compliance requirements.
-
Governance, risk, and compliance: Change auditing and security
Dominic Vogel takes a look at GRC software that provides change auditing functionality for organizations to meet governance, risk, and compliance goals. Here, he chats with a rep f...
-
Application shielding: Exploring ExploitShield
Dominic Vogel talks to the CEO of ExploitShield to find out more about what is meant by "application shielding" technology and how it fits in with other security mechanisms.
-
Short and pithy IT security tips for users
Dominic Vogel came up with 10 short security tips for users that he thinks will do the most good without overwhelming them with too much information.
-
Five-minute security: The elevator pitch
Dominic Vogel says that it's wrong to give up on instilling security awareness in users, but skipping the jargon and getting back to simple common sense is the key.
-
Bromium: Newcomer to the periodic table of security elements
Dominic Vogel looks into a new security solution that relies on micro-virtualization to isolate untrustworthy desktop tasks from enterprise networks.
-
How to start your career as a security pro
Dominic Vogel offers some tips for getting starting in the information security field whether you're just starting out or looking to make a career change.
-
Security pros: Knowing when it's time to move on (and how to do it)
Dominic Vogel draws on his recent experience to offer advice on job-changing strategies to security pros and others in IT when you realize it's time to recharge your career.
-
How user-behavior monitoring helps reduce risk
Dominic Vogel asks a researcher and a vendor to explain what behavioral monitoring adds to an organization's security strategy.
-
Putting passwords out to pasture: Identity behaviour vs. identity authentication
Dominic Vogel writes that the days of relying on passwords, strong or otherwise, is an outdated security practice. What's the next step?
-
IT security strategies for mitigating web-based risks
Dominic Vogel offers some tips on mitigating web-based threats. What works and what doesn't in the fight against malware?
-
Insidious insiders: Psychology provides clues in handling invisible threats
Dominic Vogel considers the insider threat risk in organizations and suggests that cross-departmental collaboration could help shore up data loss prevention methods.
-
Hitting Windows 8 reset button: Security bonus saves time and money
Dominic Vogel makes his pitch for the Windows 8 reset button from a security perspective.
-
Enterprise antivirus: Best practices for smooth deployments
Dominic Vogel emphasizes the importance of proper planning for deploying a new antivirus product, particularly in large enterprises. Here are his best practice guidelines to follow...
-
Transform your security awareness programs: Focus on people and risk management
Dominic Vogel points out that security pros need an attitude adjustment about how to approach security awareness in their organizations. Here's his advice for making security relev...
-
Endpoint security solutions: What you should consider when comparing vendors
Dominic Vogel identifies several key areas to evaluate when your organization is comparing solutions for an endpoint protection suite.
-
Protecting the blind side: Invest in security awareness to protect data
Dominic Vogel crafts an apt football analogy to underscore the importance of investing in security awareness training for employees. Not doing so could undo all of your high-dollar...
-
Six stages of malware response: Streamline your approach
Dominic Vogel is a rookie security guy making his way in a corporate setting. Here, he offers his streamlined approach to malware response, and the important things you can learn f...