Management, compliance & auditing

Importance of a BYOD Policy for Companies

[highlight color="blue"]Interested in formal iPhone forensics training? Check out our 3 day iPhone and iOS forensics course now available. [/highlight] Intro

IT Continuity Planning

Today most organizations have committed resources, developed policies, procedures, and tools, and set their organization and IT infrastructure to maintain th

Privacy Impact Assessment

What is a Privacy Impact Assessment (PIA)? Privacy Impact Assessment is a process to determine the impacts of a program, system, service, scheme, initiativ

InfoSec Book Excerpt: Security Metrics - Chapter 17

We like to read the latest and greatest security books, andsometimes the author and/or publisher is generous enough to share an extended with us - and you. W

Attack Surface Reduction – Chapter 4

This is Chapter 4 in Tom Olzak‘s book, “Enterprise Security: A practitioner’s guide.” Chapter 3 is available here: Building the Foundation: Architecture Desi

Building the Foundation: Architecture Design - Chapter 3

In this chapter, we define the various types of enterprise architectures, how to integrate them into strategic and tactical business objectives, and how to build from business need to system and network design.

Enterprise Security: A practitioner's guide - Chapter 1

Chapter 1Security: A working definition Managing Risk Probability of Occurrence Business Impact Threat Sources Human Threats Geographic Threats Natur

UEFI and the TPM: Building a foundation for platform trust

Table of Contents Trusted Computing Boot Path Security Challenges Boot Path Attack Surface The Trusted Memory Module (TPM) TPM Architectur

Goodbye DIACAP, Hello DIARMF

When C&A becomes A&A, will you be ready? Every few months, an elite group of DoD security experts, IT managers, and senior leadership gather to char

IT auditing and controls - IT governance and controls

“IT Governance and Controls” or “IT Monitoring and Assurance Practices for Board and Senior Management” Take your choice of titles of this article, but re