You've requested...

Information Security Magazine: March 2009 - Sky-High Risk?

If a new window did not open, click here to view this asset.

Download this next:

Improve risk management by connecting business & IT

Organisations that invest in resilience during times of uncertainty are better able to seize opportunity when it arises. In this eBook, discover how you can optimise operations, reduce costs and risk and boost resilience by connecting business and IT on a single platform. Learn more about Integrated Risk Management from ServiceNow in this ebook.

These are also closely related to: "Information Security Magazine: March 2009 - Sky-High Risk?"

  • Risk reporting: Tips for more effective board communication

    In today's digital era, effective board communication on risk is essential. As cyber threats grow with digital transformation, IT and security leaders must clearly convey organizational risks to the board.

    However, things like credibility through transparency, focus on key issues, a data-driven approach, and feedback are essential for robust risk reporting. To achieve this, many have started to centralize risk data on an integrated platform to enhance visibility into vulnerabilities and performance indicators, aiding in addressing privacy and risk communication.

  • Risk management: 5 stages to compliance

    Maturing your risk management program is vital for meeting enterprise-wide objectives. Get insights on how you can raise the maturity level of enterprise risk management. You’ll discover how your teams can make better decisions that lead to greater outcomes, by connecting business and IT with a common language on a single platform.

Find more content like what you just read:

  • Demystifying risk management

    Risk management refers to the practices and systems an organization employs to identify, monitor and remediate this risk. To shed light on risk management TechTarget has provided this article-guide, which will take you through the ins and out of risk management, as well as its importance for modern IT. Read on to learn more.

    Download

  • What’s preventing 75% of executives in trusting their data

    If skepticism of data quality has made you hesitate making business decisions, you’re not alone: 75% of executives do not have a high level of trust in their data. One of the best ways to improve visibility and trust of your data is to unify around one platform. Watch this webinar to learn more about how you can maximize enterprise resilience.

    Download

  • Essential Guide to Threat Management

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

    Download

  • Converged Endpoint Management Delivers the Goods: Risk Reduction, Productivity Gains, Licensing Fee Savings, and Improved Employee Experiences

    Endpoint security and management teams both share the goal of reducing risk, yet they often work in a segregated fashion. Consequently, they choose tech products that support their individual functions, missing opportunities to serve the greater organization better. Read this IDC report to discover the benefits of converged endpoint management.

    Download

  • ESG Report: Analyzing the economic benefits of cyber resilience with Commvault Cloud

    Enterprise Strategy Group analyzed Commvault Cloud, powered by Metallic AI, and interviewed current customers to understand its impact on IT and business goals. The analysis revealed potential financial benefits in 3 areas: cost efficiency, increased agility, and reduced risk. Download the report now to learn more.

    Download

  • Managing Cloud Computing Risk

    Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.

    Download

  • Cybersecurity in hospitality: 2023 insights

    Because of the sheer amount of sensitive data that hospitality organizations maintain, a data breach can cause major reputational damage. This report delves into the hospitality industry’s unique cybersecurity threat profile. Read on to learn about boosting your company’s security stance.

    Download

  • Secure your applications with limited resources

    While the cost of security breaches continues to increase, many security teams have found ways of achieving success with limited resources. This white paper shares real-life stories of companies that have successfully created efficiencies and cut costs in their application security strategy. Download now to discover more.

    Download

  • Guide to the dangers of third-party threats

    Modern applications are overly reliant on third-party services and content. As a result, security compromises resulting from third-party vulnerabilities have seen a marked increase. Download this white paper to unlock an in-depth look at how you can use an attack surface management (ASM) solution to protect your applications.

    Download

  • 7 advantages of a SaaS-based application security program

    In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.

    Download

  • IDC TechBrief: Interactive Application Security Testing

    With modern application development operating at break-neck speeds, DevOps teams pressured by deadlines are often forced to compromise security for efficiency’s sake. This white paper examines the benefits of using interactive application security testing to mitigate the security risk and complexities of using DevSecOps. Read on to learn more.

    Download

  • Vulnerability management trends for 2024

    44% of organizations have a formal vulnerability management program in place internally, with 28% of organizations identifying 100 or more vulnerabilities each month. These findings and more are from Dark Reading’s The State of Vulnerability Management Report. Read the report here.

    Download

  • Expert recommendations for addressing the spike in extortion

    Although recovering from offline backups can provide some protection against encryption-only ransomware attacks, organizations must take additional measures to prepare for threat actors who extort victims. Browse a detailed view of the observations of Unit42 and discover expert recommendations for addressing them.

    Download

  • Stop sacrificing innovation for security

    Application security has evolved significantly over the past few years. Today, organizations are now running daily static scans, weekly dynamic scans, and at least weekly SCA scans. However, this is not just going through the motions. Having security at the front of mind allows teams to reduce risk and build resilience. Read on to learn more.

    Download

  • E-Guide: How to tie SIM to identity management for security effectiveness

    Security information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.

    Download

  • Infosec 2012: How to Help Your Organisation Deal with Next-Generation Cyber-Attacks

    This E-Guide offers expert insight on how to address next-generation cyber-attacks. View now to learn how network visibility can help you mitigate advanced threats, and much more!

    Download

  • Enabling digital transformation safely & confidently

    Your business is forced to defend against actual cyberthreats and potential ones. So, how can you bolster your security stance in the face of all these risks? Check out this e-book to discover 10 ways that a cloud-based platform with an integrative approach can help you do so.

    Download

  • Information Security Threats: Building Risk Resilience

    Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.

    Download

  • 34-page report: Software supply chain landscape

    To understand the state of the software supply chain landscape in 2024, tap into this 34-page research report.

    Download

  • Targeted attacks: Preparation and Mitigation

    This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.

    Download

  • Top IT security priorities: Addressing risk management and compliance

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

    Download

  • Security Orchestration

    For cybersecurity teams today, alert volumes continue to rise, security product stacks continue to grow, and the threat landscape continues to expand. Security Orchestration highlights how to manage today’s security landscape including specific use cases, trends, how to select a vendor and more. Read on to get started.

    Download

  • Top 10 CI/CD security risks you can't ignore

    Pipelines open new attack surfaces if not secured properly. In this 42-page eBook, learn key strategies to lock down your CI/CD environments and processes to avoid data breaches, compromised infrastructure, and failed audits.

    Download

  • Making Threat Intelligence Actionable with SOAR

    SOAR is gaining traction as a way to improve security operations. Security and risk management leaders should evaluate how these tools can support and optimize their broader security operations capabilities. Read this Gartner Marketing Guide to learn more about sifting through the noise and choosing the best-fit SOAR tool for your needs.

    Download

  • The Pros and Cons of Delivering Web Pages Over an SSL Connection

    Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.

    Download

  • Explaining How Trusted SSL Certificates and Forged SSL Certificates Work

    This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.

    Download

  • How to Thwart Privilege Creep with Access Reviews

    In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.

    Download

  • Urban Myths About Secure Coding

    Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.

    Download

  • Securing the entire software development pipeline with Veracode Static Analysis

    Developers need security testing solutions that can keep pace with rapid, agile development processes. Traditional AppSec solutions can cause development to stall and delay the release of software. In this guide, learn how static analysis solutions can secure applications without hindering fast development.

    Download

  • 5 tips for digital transformation success: Tackling digital risk

    Read Digital Transformation & Risk For Dummies, 2nd ServiceNow Special Edition to learn how you can manage and tackle digital risk with a single platform that unlocks a common language between business and IT.

    Download

  • Ways to avoid cloud risk & security exposure

    Learn the 3 essential elements you should look for in an integrated solution that can help strengthen security, manage risk and monitor compliance in the cloud while also reducing costs and the risk of human error.

    Download

  • How to create a risk-aware defense

    Organizations need visibility into what’s happening, and the ability to adapt fast to external and internal factors. In this e-book, see how your organization can benefit from unlocking a common language and bringing together business and IT on a single platform, to enable integrated enterprise-wide risk management.

    Download

  • Top 3 issues for today’s security operations teams

    Discover how you can save over $4 million a year while building efficient security operations with ServiceNow. By giving security, risk management and IT teams total visibility of cyberthreats, you can contain cyberbreaches 85% faster and boost security analyst efficiency by 3x.

    Download

  • How this insurance company secured its attack surface

    A fortune 500 insurance and financial services company found itself with increased risks throughout its organization. With IONIX Attack Surface Management, the company was able to discover and inventory all internet-facing assets. Download now to unlock the full case study.

    Download

  • Container Security 101

    Developers have widely embraced containers because they are designed to make building and deploying so-called cloud native applications simpler, but they also carry a range of cybersecurity issues. Download this e-book to learn how you can ensure security for these essential applications.

    Download

  • Creating the right habits for cyber hygiene success

    Remediating a cyberattack can be costly, so it’s a good thing that there’s an approach to cybersecurity that can help you avoid remediation. Enter strong cyber hygiene, a preventative security method that can save your organization money and time. Check out this blog to learn about the 4 tenets of successful cyber hygiene.

    Download

  • The definitive checklist for CI/CD security

    This resource presents a concise checklist for securing your CI/CD pipeline. Learn how to harden infrastructure, use secrets management, enable logging and monitoring, leverage automation, and implement compliance checks. Read the full guide to strengthen your continuous integration and delivery.

    Download

  • ServiceNow Security Operations: The essential use case guide

    The skills shortage and increasing cyberattacks continue to challenge security teams, slowing their responses to security incidents. To help teams avoid disaster, ServiceNow developed Security Operations and the Now Platform. Learn about how these solutions work in this guide.

    Download

  • ESG's research exposes how the security analyst role must evolve

    Access this report from Enterprise Strategy Group (ESG) to discover how the role of security analyst is evolving to work with (instead of against) development, and learn what actions you can take now to set your organization up for success.

    Download

  • Supply chain security: 5-part e-book

    The first step toward defending against supply chain attacks is deepening your understanding of how they work. Enter this e-book, which contains 5 articles about supply chain security. Download the book to discover 5 actions that you can take to level up your security posture – and much more.

    Download

  • Information Risk Management – Expectations Versus Reality

    Many businesses have identified a gap between their ideas of information risk management strategies and the maturity of their implementations. Through considering the experiences of 12 security professionals, the “Information Risk Management—Expectations Versus Reality” report explores this gap. Continue reading to unlock insights.

    Download

  • Achieve risk-based vulnerability management

    Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.

    Download

  • 12 security orchestration use cases

    Security orchestration connects disparate security tools, teams and infrastructures for seamless, process-based security operations and incident response. This connectedness makes it a good enabler of security automation. Download this white paper for a comprehensive look at this and 11 other security orchestration use cases.

    Download

  • Managing M&A Risk

    To optimally manage cyber risk in the mergers and acquisitions process, acquiring organizations need a rapid, accurate way to map all the endpoint assets in a target company. Read about how this is done in Managing M&A Risk: How Endpoint Visibility Can Deliver Critical Advantages.

    Download

  • The State of Security Hygiene and Posture Management (SHPM)

    To understand how organizations are tackling security hygiene and posture management (SHPM), ESG surveyed 383 cybersecurity professionals. Review this report to learn about the common coverage gaps and challenges associated with SHPM.

    Download

  • How to accelerate your risk and compliance initiatives—and get to value faster

    Explore in this e-book some of the top risk and resilience management solutions available to your organization that can help you break silos, help embed risk and compliance management into daily work, and improve performance through risk-informed decisions.

    Download

  • Horizon Media: Spinning Up a Cyber Risk Program from Square One

    As a company grows, so does its responsibility for keeping its customers’ data and assets secure. But Horizon lacked a formal cyber risk management program, which made it hard to assure their clients that they were doing all they could to keep their information safe. So, they turned to LogicGate Risk Cloud.

    Download

  • Pulse Survey: "Organizations Struggle to Measure and Monitor Cyber Risk"

    Data from this Harvard Business Review Pulse Survey, commissioned by Tanium, illuminates how effective cyber-risk oversight is hampered by the mutual shortage of knowledge between executives and cybersecurity leaders. Read the report to learn from top executives and analyze the data for yourself.

    Download

  • Enterprise Strategy Group showcase: CyberArk Secrets Manager

    As part of the CyberArk Identity Security Platform, Secrets Manager, which includes Secrets Hub, can secure secrets across the entire organization with minimal impact on developers. Download this Showcase for an in-depth analysis of Secrets Manager performed by analysts from TechTarget’s Enterprise Strategy Group (ESG).

    Download

  • DORA: What cybersecurity leaders need to do to succeed

    The Digital Operational Resilience Act (DORA) is now law in EU countries, with enforcement starting January 17, 2025. This new white paper looks at the implications for cybersecurity leaders and the actions you need to take to ensure you’re compliant by 2025. Access the paper to learn more.

    Download

  • Expert tips for managing IT assets of departing employees

    Though challenging, efficient laptop retrieval is key to protecting company data. To minimize risk, IT managers should implement centralized processes and consider partnering with data security experts. Access this white paper to learn about best practices for managing the IT assets of departing employees.

    Download

  • The 4 key phases of cyberthreat defense

    See how to protect your entire enterprise by shifting from a tactical to a strategic approach in this white paper. Discover the 4 key phases of cyberthreat defense and how ServiceNow’s portfolio of SecOps and risk management tools is here to help.

    Download