EZINE:
In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
VIRTUAL SEMINAR:
Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
EGUIDE:
This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
WHITE PAPER:
In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
EZINE:
This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
WHITE PAPER:
The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protection requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.
EZINE:
This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
EZINE:
In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
EZINE:
Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.