Portal:Information Security
From Wikibon
(7 intermediate revisions not shown) | |||
Line 1: | Line 1: | ||
<!--|body|-->__NOTOC__ | <!--|body|-->__NOTOC__ | ||
- | |||
'''Welcome to the Wikibon Information Security Portal.''' | '''Welcome to the Wikibon Information Security Portal.''' | ||
Line 6: | Line 5: | ||
The Information Security Portal is a new resource from The Wikibon Project for business and technology professionals interested in learning from peers and sharing knowledge about challenges in the industry, trends, emerging technologies, and best in class practices. | The Information Security Portal is a new resource from The Wikibon Project for business and technology professionals interested in learning from peers and sharing knowledge about challenges in the industry, trends, emerging technologies, and best in class practices. | ||
- | The Wikibon Project invites comments from industry practitioners, technology, services, and content providers on the [http://wikibon.org/wiki/v/2010_Information_Security_Agenda Information Security Agenda: 2010]- common threats faced as global community and the priorities shared by all industry sectors for solutions. The goal of the Wikibon Project is to provide an open, quality peer research and dialog platform, and through this platform, establish industry extensions and interactions | + | The Wikibon Project invites comments from industry practitioners, technology, services, and content providers on the [http://wikibon.org/wiki/v/2010_Information_Security_Agenda Information Security Agenda: 2010]- common threats faced as global community and the priorities shared by all industry sectors for solutions. The goal of the Wikibon Project is to provide an open, quality peer research and dialog platform, and through this platform, establish industry extensions and interactions that enable a collective effort to advance a common information security agenda for end-users and technologies in 2010 and beyond. |
{| | {| | ||
|+ | |+ | ||
Line 21: | Line 20: | ||
[[Data encryption strategies|read more...]] | [[Data encryption strategies|read more...]] | ||
| valign="top" | | | valign="top" | | ||
- | {{Information Security | + | {{Information Security professional alerts}} |
|+ | |+ | ||
| valign="top" | | | valign="top" | | ||
Line 34: | Line 33: | ||
'''Action Item: <!--|actionitem|--><!--|actionitem|--> | '''Action Item: <!--|actionitem|--><!--|actionitem|--> | ||
- | ''Footnotes: <!--|footnotes|--><!--|footnotes|-->[[Category:Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Security]][[Category: Storage]][[Category: Storage security]][[Category: Wikitips]] | + | ''Footnotes: <!--|footnotes|--><!--|footnotes|--> |
+ | |||
+ | [[Category:Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Professional alerts]][[Category: Security]][[Category: Storage]][[Category: Storage asset management]][[Category: Storage professional alerts]][[Category: Storage security]][[Category: Wikitips]] |
Current revision as of 20:03, 14 April 2011
Welcome to the Wikibon Information Security Portal.
The Information Security Portal is a new resource from The Wikibon Project for business and technology professionals interested in learning from peers and sharing knowledge about challenges in the industry, trends, emerging technologies, and best in class practices.
The Wikibon Project invites comments from industry practitioners, technology, services, and content providers on the Information Security Agenda: 2010- common threats faced as global community and the priorities shared by all industry sectors for solutions. The goal of the Wikibon Project is to provide an open, quality peer research and dialog platform, and through this platform, establish industry extensions and interactions that enable a collective effort to advance a common information security agenda for end-users and technologies in 2010 and beyond.
WikitipOrganize storage security top down and bottom upOrganizations need to adopt a top-down, bottoms-up approach to organizing storage security. A top-down (Chief Information Security Officer) CISO needs to define the levels of risk and spend, as well as define a layered storage security architecture. Each storage security technology layer needs to be assigned to an appropriate IT department for implementation and ongoing operations. |
Featured ResearchData Encryption StrategiesAs the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network. |
Featured How-to Note |
Implementing Storage Network SecurityIn the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems. Action Item: Footnotes: |