Learn about 2 common types of cyber-attacks and how expert Ivan Foreman recommends eliminating those threats in this webcast. Is your current SIEM platform creating more problems than it solves?
Download this CISO toolkit for tips and techniques to approach your board of directors about cybersecurity. The international editorial board of JISA and its guest editors are committed to the highest scientific standards by implementing a strict peer-review policy for submitted articles.
As the market for security awareness computer-based training CBT is evolving, vendors are seeking out ways to differentiate their products and services to attract security and risk managers.
Management of information and communications technology security. Cyber attackers often target endpoints and then move laterally through the network. Smart-city technologies support exciting innovations while improving quality of life for citizens.
The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.
Download this custom article to learn about an advanced bot manager that will help prevent your organization from falling victim to the bot epidemic. Download this e-book for 3 strategies on how to up your DDoS game, today. With the abilities to track human behavior and detect threats with greater speed and efficiency, AI has the potential to change the course of cybersecurity for government agencies and keep them a step ahead at all times.
In this Gartner Magic Quadrant market trends report, determine which security awareness CBT vendor is best for your enterprise. Towards a Culture of Security.
Evaluation criteria for IT security. Article Recommendations Abstract Currently, all organizations have to tackle the issue of information security. Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
In this report, discover the research the Ponemon Institure conducted to further understand the reasons for the gap in modern IT security programs and strategies. Boards oversee risk, not operations.
The implementation of ISM should be carried out to the extent consistent with the needs of the organization. Traditional VPNs and firewalls have gone relatively unchanged over the last 20 years, yet technology and the ways in which people connect have seen significant change.
Concepts and models for information and communications technology security management 4. Information security incident management. Read on to learn about the security services they implemented.
As an IT security professional, how do you go about reducing risk and increasing protection for your organization? Download this resource to learn why using a web application firewall WAFwith full-proxy capabilities, can be your best defense mechanism against fraudsters.
In this webinar, ESG Senior Analyst Doug Cahill will discuss cloud trends and how deploying enterprise-class data loss prevention and cloud access security brokers solutions together can provide key value for your business.
JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions.
Read more Journal of Information Security and Applications JISA focuses on the original research and practice-driven applications with relevance to information security and applications.
Technology can advance your business through the future, but it also provides the largest barrier to meeting GDPR compliance.
Download this white paper for a look at a security technology that allows you to protect your entire enterprise; the people, the platform and the data, while staying ahead of incoming cyberattacks.Introduction of Information Security Management should be a strategic decision.
The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization.
Current Research Topics in Information Security Future research will focus on networks and cloud systems; the research methodology will be empirical systems security: (1) passively observing large systems and (2) active probing that stimulates revealing behavior of the systems.
Current Research Topics in Information Security. IET Information Security publishes original research papers in the following areas of information security and cryptography.
RESEARCH CONTENT: Information security teams worldwide are increasingly concerned about the rapid growth of cyberthreats. To address this concern, a survey was conducted to explore the perspectives of cybersecurity professionals on.
This paper is a review of the literature on ―information security‖ published in the period of and provides the key to designing a management model of information security factors.
The bibliographic review was conducted in three stages: a) review of unstructured information, b) bibliometric analysis, and c) content analysis, organization, and synthesis.
The following research paper provides analysis of thirteen (13) information security technology topics, arranged in ten (10) groups, that are either commonly found or emerging within the information security industry.Download