
Database Security Management-Enterprise Data Protection
Learn more about database security gateways, database encryption, issues, threats, software, security gateways, how to detect database vulnerabilities.
How do you align an IT risk assessment with COBIT controls?
Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.
Conficker-infected machines now number 7 million, Shadowserver …
The Conficker botnet now consists of 7 million Conficker infected machines, according to the Shadowserver Foundation. Investigators hunt for the Conficker authors, but it is increasingly …
How to build a toolset to avoid Web 2.0 security issues
Learn what to include in a toolset to thwart Web 2.0 security issues like lost productivity, data leaks and increased enterprise risk.
Hacktivism examples: What companies can learn from the HBGary …
In one of the most blatant hactivism examples in recent memory, the group Anonymous compromised the security company HBGary Federal. Learn more about what took place in the …