91ÖÆÆ¬³§

Tagged - security

Asia Letter, Q2 2014

This week, Asia Editor Scott Foster takes a close and detailed look at country plans and hopes in the worlds of sustainability and energy, from vendor to customer, supply...

The New INSecurity and INVNT/IP

The nation-sponsored cyber attacks on US corporations are not the result of a purely military plan, but of a new national business model.

Satya's Challenge: What Microsoft Faces

The problem for Microsoft has never been making money; Steve Ballmer proved that beyond a doubt. Rather, the company's historic challenge has been to convince investors...

Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

Security Governance and Management Implementation Roadmap

Use this tool to build a roadmap to help you reach your target state.

Information Security Risk Management Template

Use this template to build your information security risk management process.

Information Security Compliance Template

Use this template to manage your information security compliance requirements.

Information Security Training Tool

Use this tool to determine your organization’s security training and awareness needs to begin building your training and awareness program.

MALT: A New Killer Category

There is an entirely new category of wireless smartphone applications about to be launched, with the potential of making staggering amounts of money. What is this new...

Special Letter: Finding Security in the Cloud

Today, everyone is talking cloud computing, but the issue of security continues to drive the conversation around corporate adoption. While it is obvious that startups have...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us