This week`s resource selections focus on implementing a solidinformation security program that includes a comprehensive informationsecurity enterprise architecture.Dan Swanson————————————————-1. Twenty Critical Controls for Effective...
Lost in the headlines of the new Gumblar attack and its astronomical growth is that malware is easily preventable with updated security software and some sensible patching. Find out what you should be doing to protect your company from the Web
As C-level executives finally come around on Web 2.0 usage, many security admins continue to lag behind the threats it will bring, according to Websense. Plus, why Info-Tech says security vendors are missing a key issue in the debate
Enterprise IT is quick to scrap hardware and infrastructure spending, but slow on the trigger when it comes to staffing and IT service cuts, an Info-Tech analyst says. Find out why IT decision makers should better scrutinize their in-house cost management priorities