Portal:Information Security
From Wikibon
Line 18: | Line 18: | ||
[[Question and answer about DBAs|read more...]] | [[Question and answer about DBAs|read more...]] | ||
| valign="top" | | | valign="top" | | ||
- | {{ | + | {{Information Security Professional Alerts}} |
|+ | |+ | ||
| valign="top" | | | valign="top" | |
Revision as of 03:13, 30 September 2009
Welcome to the Wikibon Information Security Portal. The Information Security Portal is a resource for IT professionals interested in learning from peers and sharing knowledge with other practitioners.
WikitipOrganize storage security top down and bottom upOrganizations need to adopt a top-down, bottoms-up approach to organizing storage security. A top-down (Chief Information Security Officer) CISO needs to define the levels of risk and spend, as well as define a layered storage security architecture. Each storage security technology layer needs to be assigned to an appropriate IT department for implementation and ongoing operations. |
Featured ResearchData encryption strategies...Glenn Street, senior database specialist with Copyright Clearance Center, shares with us some insights about being, or becoming, a database administrator (DBA): Q: What’s the nutshell description of a DBA? |
|
Featured Success Story |