[TechRepublic] Chasing approval for an IT-security budget

IT Security

TechRepublic Member | March 06, 2012

Chasing the elusive approval for an IT-security budget

There are always challenges selling upper management on an IT-security solution. Michael Kassner found some help -- risk management analysis. Here's how you can use it to help bolster your argument. Read more

Resource of the day

Rethink Your Storage With IBM

Data storage is an interesting thing. While it's easy to add more storage with band-aid solutions, before long, you'll need to seriously rethink how you store. For some advice, turn to this white paper.


WikiLeaks publishes millions of Stratfor emails accessed by Anonymous

Patrick Lambert offers an overview of the latest Anonymous exploit -- publishing millions of emails it accessed from a company that has been called a "shadow CIA." Read more

IT security strategies for mitigating web-based risks

Dominic Vogel offers some tips on mitigating web-based threats. What works and what doesn't in the fight against malware? Read more

Cybercrime and the problem of online identity verification

Verifying online identity is an increasingly important consideration as more official business is conducted online. Deb Shinder writes about the related issues of loss of anonymity, privacy, and... Read more

Additional TechRepublic resources

 

DIY: Create free, self-signed Certificate Authorities

Learn three methods for creating self-signed Certificate Authorities without depleting your company's IT security budget. Read more

Online privacy policies: User privacy vs. tracking technologies

Ryan Boudreaux looks at the state of online privacy policies in light of Google's and others run-ins with consumers. Does your web dev strategy include tracking technologies? Read more

Three methods for erasing data securely from an iOS device

Need to re-issue, sell, or otherwise dispose of an iOS device? First, make sure you've securely wiped all the user data from it. Wil Limoges offers three ways to wipe your iPhone or iPad. Read more

Featured multimedia

 

Cracking Open the Boogie Board Rip

Bill Detwiler cracks open the Boogie Board Rip. Inside the eWriter, he finds a flexible LCD from Kent Displays, a Waltop Pen Input system, and TI MSP430 MCU. View on site


Featured Webcast

Live Threat Demo: Behind the Business of Hacking

When hackers get together, bad things happen. Check out this webcast to learn how you can protect yourself from gangs of cyber criminals.


Today's recommended downloads

Rethink Your Storage With IBM (IBM)

Securing Critical Data and IT Infrastructure in Healthcare Environments (Hewlett-Packard (HP))

High Availability for Small IT Operations (VMware)

Designing Network for Rich Media Communications (Global Knowledge)

Live Threat Demo: Behind the Business of Hacking (Sophos)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

Windows 8 fails to wow CIOs, at least so far

CIOs are still looking for the new features to make Windows 8 an enterprise must-have, according to TechRepublic's CIO Jury.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic UK

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment