Antivirus, Application security, Authentication, backdoors, Biometrics, Current threats, cybersecurity, Data breach, Data-security, Digital certificates, Disaster recovery planning, Encryption, filtering, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Identity management, Incident response, Information security, Intrusion management, ISA Server, IT security, malware, McAfee, Microsoft patches, Microsoft Security, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security Program Management, Security tokens, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
I am currently a student at UAT and we were directed to this forum with the instructions to post a question about Security Frameworks, so the best question I can have is, What Security Frameworks have any of you personally worked with and which do you feel is better?
A compliance officer in Europe could use some advice from fellow IT professionals and executives. His IT budget is being scrutinized, as is the case in every organization in 2009; he needs targets to get things done more efficiently but without taking on more risk. His department is evaluating...
I have been brought in to implement the Cobit Framework at a medium size company with about 200 IT staff. Management needs to hear some success and failure stories to better understand the methodologies for implementation. I have full access to ISACA, IIA, ITIL, etc., but I would like to see some...