About 13 results
Open links in new tab
  1. How do you align an IT risk assessment with COBIT controls?

    Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.

  2. Security automation systems, tools and tactics

    Pair cyber insurance, risk mitigation to manage cyber-risk The role of cyber insurance may come after a breach, but it remains a useful element in an organization's vulnerability management …

  3. Hacktivism examples: What companies can learn from the HBGary …

    In one of the most blatant hactivism examples in recent memory, the group Anonymous compromised the security company HBGary Federal. Learn more about what took place in the …

  4. Verizon data breach report shows weak passwords at root of 2011 …

    Mar 7, 2012 · Hacking and automated attacks made simple by poor password management practices were at the root of most 2011 data breaches, and many firms failed to detect the …

  5. Search Security Resources and Information from TechTarget

    News brief: Browser security flaws pose growing risk Forewarned is forearmed, but too many employees don't realize how sophisticated deepfakes have become.

  6. Conficker-infected machines now number 7 million, Shadowserver …

    The Conficker botnet now consists of 7 million Conficker infected machines, according to the Shadowserver Foundation. Investigators hunt for the Conficker authors, but it is increasingly …

  7. Information security incident response

    AI in risk management: Top benefits and challenges explained AI and machine learning tools can aid in risk management programs.

  8. TechTarget Deutschland – Deutschsprachiges …

    Unabhängige Experten bieten Einblicke in führende Technologien Unser Netzwerk aus mehr als 750 unabhängigen Fachautoren und Experten liefert detaillierte, unvoreingenommene …

  9. Hacker tools and techniques: Underground hacking sites

    May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.

  10. Week 10: Are you throwing out company secrets? (Part 1

    In an effort to help busy security managers, CISSP Shelley Bard's weekly column will build upon the concept of the perpetual calendar, offering a schedule of reminders for a proactive, …