IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

720_ping_logo5 Steps to Secure Internet SSO

This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system.

Read more...
 
E-mail

Symark PowerBroker: Root Access Risk Control for the Enterprise

Compliance efforts and security concerns have driven businesses to make substantial investments in threat control. Too often, however, these efforts pay far too little heed to the risks posed by poorly controlled access to administrative privilege in IT, which can have a hugely disproportionate impact on the business.
Read more...
 
E-mail

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line

This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.
Read more...
 
Page 5 of 5

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner