Articles

What Makes Organizations Resilient and Why You Should Care (Optiv Security)

Stopping Privilege Creep: Limiting user privilege with access reviews (Search Security) (registration required)

Managing Identities in Hybrid Worlds (Information Security Magazine) (registration required)

Taking a Wider View of Application Security (Software Magazine)

Protecting Apps and Data with a Disaster Recovery Plan (Software Magazine)

IVista’s Anti-Malware Enough? (NO!) (SearchSecurity free webcast, registration required) (also on ForbesBusinessweek)

Identify Vulnerabilities with Application Scanning Tools (Software Magazine)

CISSP certification can serve as introduction to regulatory compliance (SearchSecurity)

7 security mistakes companies make (ComputerWorld)

For an infosecurity career, get the technical basics first (ComputerWorld)

Six ways to justify security training (ComputerWorld)

Integrity begins within: Security pros lead by example (ComputerWorld)

Is Microsoft ignoring the biggest source of security threats? (ComputerWorld)

Security predictions for 2004 (ComputerWorld)

Vulnerability Management Ushers an Era of Technical Risk Management (Software Magazine)

Patching rhythm: start a new patch process (ComputerWorld)

Four ways to secure your company on a shoestring budget (ComputerWorld)

Lessons learned from the blaster worm (ComputerWorld)

Security in the software development life cycle (SearchSecurity)

Secrets to the best passwords (ComputerWorld)

Tipping sacred cows: Make bold decisions to protect your information (ComputerWorld)

Is an asset inventory in your company’s future? (ComputerWorld)

Condition Orange: What to do now to secure your systems (ComputerWorld)

Infosec books for IT managers (ComputerWorld)

Are Security Certifications Worth It? (ComputerWorld)

The roles of the corporate CISO and CPO (SearchSecurity recorded webcast)

Security training for IT managers (ComputerWorld)

Keep IT managers on top of security (ComputerWorld)

Solaris 8 user administration tools (InformIT)
……. Sample chapter is from the book Sun Certified System Administrator for Solaris 8 Study Guide


Advertisements

One thought on “Articles

  1. Pingback: Author, Instructor, Security Advisor |

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s