Menu
Submit Site
Home
Computer
Security
All sites of Security
Light Blue Touchpaper
Light Blue Touchpaper- Security research weblog, from the University of Cambridge Computer Laboratory. ...
Security Incite Rants
Security Incite Rants- Weblog feed offering information and opinion on information security topics. ...
Computer Security News - Topix
Computer Security News - Topix- News on computer security continually updated from thousands of sources around the net. ...
Topix: Computer Security
Topix: Computer Security- News about computer security, collected from various sources on the web. ...
eWeek - Security
eWeek - Security- Security news, alerts, product review and resources for enterprise and end users. ...
O'Reilly Computer Security & Privacy
O'Reilly Computer Security & Privacy- List of books available in this subject area. ...
IT World: Security
IT World: Security- Security news, newsletters, white papers, and webcasts selected by expert guides for enterprise IT professionals. ...
NewsNow
NewsNow- 24-hour newsfeed aggregating breaking security and encryption headlines from many other websites such as CNET, Wired, Linux Today, and Slashdot. Updated every five minutes. ...
Krebs on Security
Krebs on Security- Former Washington Post staffer Brian Krebs writes on cyber crime and other Internet security topics. ...
Effect Hacking
Effect Hacking- Latest computer security news and guides for troubleshooting. ...
Information Systems Audit and Control Association
Information Systems Audit and Control Association- Worldwide association of IS professionals dedicated to the audit, control, and security of information systems. Offer CISA qualification and COBIT standards. ...
ISSA - International Systems Security Association
ISSA - International Systems Security Association- An international non-profit organization of information security professionals and practitioners. It provides education forums, publications and peer interaction opportu ...
First
First- Forum of Incident Response and Security Teams. ...
Switch-CERT
Switch-CERT- Swiss CERT-Team from the Swiss research network (Switch). ...
Association for Automatic Identification and Mobility
Association for Automatic Identification and Mobility- Global trade association for the Automatic Identification and Data Capture (AIDC) industry, representing manufacturers, consultants, system integrators, and users in ...
CERT UK
CERT UK- National computer emergency response team in the United Kingdom. ...
Building Effective, Tailored Information Security Policy
Building Effective, Tailored Information Security Policy- Presents the presentation of the 20th NISSC Internet Technical Security Policy Panel. ...
Make Your Web Site P3P Compliant
Make Your Web Site P3P Compliant- Describes how to create and publish your company's platform for privacy performance policy,. A W3C initiative, in six steps. ...
P3P Guiding Principles
P3P Guiding Principles- Defines the principles behind the W3C Platform for Privacy Preferences initiative. ...
Acceptable Use Policy Report
Acceptable Use Policy Report- Provides a report on Acceptable Usage Policy, including what corporations expect of it, a case study, and a framework for creating your own policy. ...
Institute for Security and Open Methodologies (ISECOM)
Institute for Security and Open Methodologies (ISECOM)- Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing. ...
Canada's Export Controls
Canada's Export Controls- Unofficial / unverified article describing Canada's export controls on cryptographic software. ...
Information Security Policies
Information Security Policies- Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall. ...
CobiT User Group
CobiT User Group- International user group and hub for CobiT, the emerging IT control and security methodology. ...
Common Criteria Evaluation and Validation Scheme
Common Criteria Evaluation and Validation Scheme- Provides details of the US government scheme which is widely known as 'Common Criteria'. ...
AIX Patches - Fixdist
AIX Patches - Fixdist- You need the "fixdist" program to install AIX patches. ...
RFC2196 (Site Security Handbook)
RFC2196 (Site Security Handbook)- A guide to developing computer security policies and procedures for sites that have systems on the Internet. Published 1997. ...
Building and Implementing a Successful Information Security Policy
Building and Implementing a Successful Information Security Policy- A white paper providing the reader with new and innovative aspects on the process of building a Security Policy, as well as managing a Security Awarenes ...
GASSP Home Page
GASSP Home Page- Generally Accepted System Security Principles, developed by The International Information Security Foundation. ...
Do you have an intrusion detection response plan?
Do you have an intrusion detection response plan?- Discussion of what should go into the creation of an intrusion detection plan and the expected results. ...
Return on Information Security Investment
Return on Information Security Investment- Assess your company's Return on Information Security Investment ...
IT Security at MIT
IT Security at MIT- Provides a wide range of policies, papers and related resources to support secure computing. ...
IT Security Cookbook
IT Security Cookbook- A guide to computer and network security with a strong focus on writing and implementing security policies. This is primarily intended for security managers and system administrators. ...
An Overview of Corporate Computer User Policy
An Overview of Corporate Computer User Policy- This article discusses the elements of a corporate security policy, which it refers to as the gateway to a company`s intellectual property. ...
Understanding the Virus Threat and Developing Effective Anti-Virus Policy
Understanding the Virus Threat and Developing Effective Anti-Virus Policy- This paper focuses on providing the reader with an overview of the current virus landscape and aids in developing best practice anti-virus polici ...
The Basics of an IT Security Policy
The Basics of an IT Security Policy- This paper is intended to explain the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary component ...
What Makes A Good Security Policy?
What Makes A Good Security Policy?- Offers a paper presenting the core elements of security, and arguing that in order to properly address security, the most fundamental item necessary is a security policy. ...
Perico AS
Perico AS- Scandinavian supplier of security products including software protection, storage management, secure communications, firewalls and virus protection. ...
How to Develop Good Security Policies and Tips on Assessment and Enforcement
How to Develop Good Security Policies and Tips on Assessment and Enforcement- [Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess th ...
OSSTMM: Open Source Security Testing Methodology Manual
OSSTMM: Open Source Security Testing Methodology Manual- A widely used, peer-reviewed, methodology for performing security tests. ...
SANS InfoSec Reading Room
SANS InfoSec Reading Room- Articles on security policies and other information security topics. ...
ITworld.com - Security's human side
ITworld.com - Security's human side- IT World article - essentially a review of Pentasafe's VigilEnt security policy management product. ...
U.S. Department of Health and Human Services
U.S. Department of Health and Human Services- Security standards, transactions and code set standards, identifier standards, mailing lists, implementation guides, and administrative simplification. ...
Safenet Inc
Safenet Inc- Global company offering information security and data protection through a full spectrum of encryption technologies. ...
Wick Hill Group
Wick Hill Group- Value added distributor specialising in secure infrastructure solutions for ebusiness. Portfolio includes a range of security products from firewalls to SSL VPN, as well as web access and web management ...
Security Engineered Machinery
Security Engineered Machinery- Shredders for secure document disposal. ...
Lexias Incorporated
Lexias Incorporated- Provides next generation solutions in data security and high availability data storage. ...
Silanis Technology
Silanis Technology- Electronic and digital signature solution provider includes resources, white papers, product news and related information. ...
Mission Critical Systems
Mission Critical Systems- Providing organizations with the tools, controls and training to secure your infrastructure. ...
Sandstorm Enterprises
Sandstorm Enterprises- Products include PhoneSweep, a commercial telephone line scanner and NetIntercept, a network analysis tool to reassemble TCP sessions and reconstruct files. ...
« First
Previous
Page 5 of 42.
Next
Last »
Latest sites from Security
HoneyDrive Desktop
SecureLab
Security Focus
CERT Coordination Center
CR80 News
Heimdal
CyberEvidence, Inc.
JurInnov Ltd.
G-C Partners
Secure Crossing
Privacy Scan
Red Iron
Degausser.co.uk
TSFactory
Nmap
Avatier Corporation
Yoggie Security Systems
Nsauditor.com
Inguama
Sybari Software, Inc.
Declude Virus
Avira
CAcert
Checkpoint
InfoExpress
Send feedback
submit