Tagged - security

Satya's Challenge: What Microsoft Faces

The problem for Microsoft has never been making money; Steve Ballmer proved that beyond a doubt. Rather, the company's historic challenge has been to convince investors...

Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

Security Governance and Management Implementation Roadmap

Use this tool to build a roadmap to help you reach your target state.

Information Security Risk Management Template

Use this template to build your information security risk management process.

Information Security Compliance Template

Use this template to manage your information security compliance requirements.

Information Security Training Tool

Use this tool to determine your organization’s security training and awareness needs to begin building your training and awareness program.

MALT: A New Killer Category

There is an entirely new category of wireless smartphone applications about to be launched, with the potential of making staggering amounts of money. What is this new...

Special Letter: Finding Security in the Cloud

Today, everyone is talking cloud computing, but the issue of security continues to drive the conversation around corporate adoption. While it is obvious that startups...

Safety on the Net: Authentication, Pseudonymity, and Resilience vs. Increasing Threats

Vint Cerf, Google's Chief Evangelist and the "Father of the Internet," joins his longtime friend Larry Smarr, himself one of the technology heroes of the age, onstage for...

International Challenges to Innovation Protection

I believe that everyone needs to hear Sir Richard's thoughts and cautionary comments on the subject of the Chinese People's Liberation Army attacking commercial and...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us