Tips
Tips
IT risk management
-
Five ways to prepare a company board for a cyber breach
Five key things that boards need to do to stop their businesses leaking like sieves and potentially going to the wall Continue Reading
-
How to implement risk-based security
Implement a simple process to identify, analyse and prioritise risk without significant investment in time or money Continue Reading
-
Audits and compliance requirements for cloud computing
Even as India Inc experiments with the cloud, security concerns play spoilsport. These cloud computing audit and compliance tips will make your journey easier. Continue Reading
-
A free risk assessment template for ISO 27001 certification
Risk assessment is the first important step towards a robust information security framework. Our simple risk assessment template for ISO 27001 makes it easy. Continue Reading
-
Risk management for cloud computing deployments
Cloud risk management involves more than meets the eye. Our expert details risk management for public cloud setups in this multi-part series. Continue Reading
-
Information security budgets: Five steps to obtain management buy-in
Getting management to approve security budgets is difficult. Here are guidelines to help you prepare and present information security budgets effectively. Continue Reading
-
6 point SIEM solution evaluation checklist
With SIEM solutions gaining steam in India, Satish Jagu of Genpact shares concise tips based on the lessons from his SIEM implementation experiences. Continue Reading
-
Segregation of duties: Small business best practices
Segregating duties can be tough in organisations that have few staff members and resources. Get duty segregation best practices for SMBs. Continue Reading
-
Best practices for audit, log review for IT security investigations
Device logs can be one of the most helpful tools infosec pros have, or they can be a huge waste of space. Continue Reading
-
NIST SP 800-30 standard for technical risk assessment: An evaluation
Risk assessment with NIST SP 800-30 focuses on securing IT infrastructure. Find out NIST SP 800-30 strengths, and learn how it differs from other standards. Continue Reading
-
OCTAVE risk assessment method examined up close
The OCTAVE risk assessment method is unique in that it follows a self-directed approach to risk assessment. Leverage its strengths with this expert tip. Continue Reading
-
SAP security tutorial: Top 10 SAP security implementation steps
Implementing SAP software securely isn't only the job of SAP specialists; the entire IT department has a role to play. Learn the top ten steps to a secure SAP implementation. Continue Reading
-
Top incident response steps: Incident response team responsibilities
Do you know the proper incident response steps to handle a breach? Expert Davy Winder covers how to manage incident response team responsibilities. Continue Reading
-
Leveraging ISO 27005 standard’s risk assessment capabilities
In this first of a series of articles on risk assessment standards, we look at the latest in the ISO stable; ISO 27005’s risk assessment capabilities. Continue Reading
-
Mature data loss prevention: 8 questions to ask your vendor
To determine if a data loss prevention (DLP) solution truly meet your organization’s needs, there are certain clarifications you always require. Continue Reading
-
Employee information awareness training: PCI policy templates
To comply with PCI DSS -- and keep cardholder data secure -- organisations must train their employees on data handling best practices. This tip explains how. Continue Reading
-
Seven social media security best practices
This tip aims to highlight seven crucial factors to be considered while devising a strategy for optimal social media security. Continue Reading
-
How to plant a listening device
Part two of our Les Goldsmith interview reveals how to plant a listening device if you feel like conducting a little industrial espionage. Continue Reading
-
How to create and enforce employee termination procedures
In this Ask the Expert Q&A, Shon Harris, our security management expert, reviews how the the security group, HR and management should work together to define and enforce employee termination policies, and reviews what should be done during each ... Continue Reading