Articles on Risk Management
- Tools Analyze Memory of an Infected System With Mandiant's Redline Mandiant's free Redline tool triages potentially compromised hosts through live memory analysis, replacing Audit Viewer. It uses Memoryze to capture memory, assigns Malware Risk Index scores using...
- Risk Management Herd Behavior in Cybersecurity: The Good and The Bad The security industry exhibits herd-like behavior with both benefits and drawbacks. Higher vigilance by some allows others to focus elsewhere—good for collective defense. But anxiety is contagious...
- Leadership Limitations of Frameworks in Information Security Security frameworks like ISO 27002 and PCI DSS provide structure, but organizations often adopt them blindly without considering applicability. Companies misinterpret prescriptive standards to suit...
- Risk Management Information Security Implications of the New Tech Bubble
- Risk Management Understand the Risks of Email Search Add-Ons and Services Cloud email search tools like Greplin and Xobni index messages and contacts across services, creating attractive targets for attackers. Most vendors provide little detail about security measures....
- Risk Management Know the Alternatives When Negotiating IT Risk Mitigation Approaches When business managers reject expensive security recommendations, present alternative mitigation options—such as virtual patching as a stopgap before code fixes. Understanding your BATNA (Best...