This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.
Cybercrime and the potential fragmentation of the internet are among the most serious risks facing businesses and governments in 2014, this report from the World Economic Forum reveals.
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Many organizations are in the midst of implementing ITIL. But are they putting the appropriate operational processes into place? Learn how automating operational processes with run book automation software can help organizations better benefit from ITIL.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines