What Makes Organizations Resilient and Why You Should Care (Optiv Security)

Stopping Privilege Creep: Limiting user privilege with access reviews (Search Security) (registration required)

Managing Identities in Hybrid Worlds (Information Security Magazine) (registration required)

Taking a Wider View of Application Security (Software Magazine)

Protecting Apps and Data with a Disaster Recovery Plan (Software Magazine)

IVista’s Anti-Malware Enough? (NO!) (SearchSecurity free webcast, registration required) (also on ForbesBusinessweek)

Identify Vulnerabilities with Application Scanning Tools (Software Magazine)

CISSP certification can serve as introduction to regulatory compliance (SearchSecurity)

7 security mistakes companies make (ComputerWorld)

For an infosecurity career, get the technical basics first (ComputerWorld)

Six ways to justify security training (ComputerWorld)

Integrity begins within: Security pros lead by example (ComputerWorld)

Is Microsoft ignoring the biggest source of security threats? (ComputerWorld)

Security predictions for 2004 (ComputerWorld)

Vulnerability Management Ushers an Era of Technical Risk Management (Software Magazine)

Patching rhythm: start a new patch process (ComputerWorld)

Four ways to secure your company on a shoestring budget (ComputerWorld)

Lessons learned from the blaster worm (ComputerWorld)

Security in the software development life cycle (SearchSecurity)

Secrets to the best passwords (ComputerWorld)

Tipping sacred cows: Make bold decisions to protect your information (ComputerWorld)

Is an asset inventory in your company’s future? (ComputerWorld)

Condition Orange: What to do now to secure your systems (ComputerWorld)

Infosec books for IT managers (ComputerWorld)

Are Security Certifications Worth It? (ComputerWorld)

The roles of the corporate CISO and CPO (SearchSecurity recorded webcast)

Security training for IT managers (ComputerWorld)

Keep IT managers on top of security (ComputerWorld)

Solaris 8 user administration tools (InformIT)
……. Sample chapter is from the book Sun Certified System Administrator for Solaris 8 Study Guide

1 thought on “Articles

  1. Pingback: Author, Instructor, Security Advisor |

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.