- Risk Management Which Information Security Controls Are Most Important?
Comparing Securosis, PwC, and SANS 20 Critical Controls projects, system hardening appears across all three lists. Other consistently important controls include centralized security event monitoring,...
- Leadership CISOs Can Find Allies at the General Counsel Office
CISOs and General Counsel share overlapping goals: policy legality, intellectual property protection, risk/business balance, compliance obligations, and freedom to critique other groups' decisions....
- Social Networking Quora Essentials for Information Security Professionals
- Web Security Cross-Side Scripting Demystified
- Training Deploying Google Chrome in the Enterprise
Google released enterprise-friendly Chrome deployment tools: MSI installer packages for central rollout, ADM policy templates for Group Policy configuration, and Chrome Frame plugin for IE. Group...
- Malware Low Price as a Differentiator for Information Security Products
Low price can be a security product differentiator in several ways: strengthening an ecosystem (Microsoft's free Security Essentials), as loss leaders bundled with other products, as freemium...