Checklist for a successful security assessment |
- Checklist for a successful security assessment
- Lesson from SecurID breach: Don't trust your security vendor
- 8 security considerations for IPv6 deployment
- Virtualization, 10G Ethernet streamline Cisco user's data center
- Cisco: IP traffic to quadruple by 2015
- 10G top-of-rack switches to surge to $1B in sales this year
- Sony to restore Thursday all PlayStation Network services
- Facebook video scam puts malware on Mac and Windows
- Google says phishers stole e-mail from US officials, others
- Cyberattacks fuel concerns about RSA SecurID breach
- Cybersecurity research consortium: New tech on the way
- Mac scareware gang evades Apple's new anti-malware defenses
- Security still a concern for those considering cloud move
- DroidDream authors again pollute Android Market
- Secure software brought to you by the acronym WRT
- Mobile App Security: 5 Ways to Protect Your Smartphone
Checklist for a successful security assessment Posted: 02 Jun 2011 07:12 AM PDT A security assessment is a request to analyze the risk of an IT solution. The request is initiated by a CISO (Chief Security Officer) or ISO (Information Security Officer) within a corporation. It is used to make sure that security concerns are met before changes are made to the information technology infrastructure. There are foundation plans which evaluate the state of new applications or infrastructure. Or there are incremental plans that address changes to the foundation plan. |
Lesson from SecurID breach: Don't trust your security vendor Posted: 02 Jun 2011 05:56 AM PDT |
8 security considerations for IPv6 deployment Posted: 01 Jun 2011 12:21 AM PDT |
Virtualization, 10G Ethernet streamline Cisco user's data center Posted: 01 Jun 2011 01:39 AM PDT |
Cisco: IP traffic to quadruple by 2015 Posted: 31 May 2011 11:34 PM PDT |
10G top-of-rack switches to surge to $1B in sales this year Posted: 31 May 2011 11:21 PM PDT |
Sony to restore Thursday all PlayStation Network services Posted: 02 Jun 2011 09:55 AM PDT |
Facebook video scam puts malware on Mac and Windows Posted: 01 Jun 2011 04:02 AM PDT |
Google says phishers stole e-mail from US officials, others Posted: 01 Jun 2011 02:08 AM PDT |
Cyberattacks fuel concerns about RSA SecurID breach Posted: 01 Jun 2011 12:42 AM PDT |
Cybersecurity research consortium: New tech on the way Posted: 01 Jun 2011 12:29 AM PDT |
Mac scareware gang evades Apple's new anti-malware defenses Posted: 01 Jun 2011 12:09 AM PDT |
Security still a concern for those considering cloud move Posted: 31 May 2011 11:44 PM PDT |
DroidDream authors again pollute Android Market Posted: 01 Jun 2011 06:35 AM PDT |
Secure software brought to you by the acronym WRT Posted: 01 Jun 2011 06:34 AM PDT With breaches ever on the rise and software vulnerabilities at the heart of many security incidents, CSOonline decided to talk with noted software security expert Rafal Los. Los, currently security evangelist with Hewlett-Packard Software, is an industry veteran who has worked as a security consultant and even as information security officer in the Fortune 100. We wanted to get his thoughts on what organizations can do -- today -- to improve the security of the applications they develop. |
Mobile App Security: 5 Ways to Protect Your Smartphone Posted: 01 Jun 2011 06:30 AM PDT |
You are subscribed to email updates from "Cisco" via Ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment