10 Pitfalls Of IT Risk Assessment

As IT organizations seek to make better risk-based decisions about security practices, perhaps the number one component for success is the IT risk assessment.

Andrew Case on Digital Forensics and Incident Response

Digital forensics refers to the processes involved in examining data from harddrives, volatility memory (RAM), network captures, and a wide range of digital devices for artifacts that remain after specific actions occurred on a system.

To Determine Threat Level, Context Matters

While many security professionals are ready to toss Java–the favored target of attackers’ exploitation efforts–out of the enterprise, business decision makers often fall back on classifying the software as a business necessity.