Virtualization Security Strategy
This white paper discusses a coordinated approach for intrusion detection and prevention in a virtualization environment. 
Information security is the practice of protecting digital and physical information from unauthorized access, theft, disruption, and destruction. It encompasses the protection of data across all mediums, including physical documents and digital storage systems.
Information security involves a range of practices, including:
By implementing information security practices, organizations can protect their sensitive information from unauthorized access, theft, or destruction. Information security can also enhance customer trust and protect an organization’s reputation.
The Information Security category in our CIO Reference Library is a curated collection of resources, articles, and insights focused on providing IT executives and other professionals with a comprehensive understanding of information security principles, strategies, and best practices.
Information security is the practice of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Effective information security measures are critical for organizations seeking to protect sensitive data, comply with regulations, and maintain business continuity.
This category covers a wide range of topics related to information security, including:
By exploring the Information Security category, IT executives and other professionals can gain a comprehensive understanding of information security principles, strategies, and best practices. This knowledge will enable them to develop and implement effective information security measures that protect sensitive data, comply with regulations, and maintain business continuity.
This white paper discusses a coordinated approach for intrusion detection and prevention in a virtualization environment. 
This quick guide to data security for businesses discusses 5 key principles to stay away from trouble.
This guide details the steps to integrate information security into the software development lifecycle (SDLC) and related IT projects and initiatives.
This study provides a framework to compare and assess information security governance, strategy, investment, and practices with other organizations using the ISO/IEC 17799 framework for security standards as a guide. The study was done for institutions in higher learning but its lessons can be allied to any organization.
As organizational boundaries vanish, so does the traditional information security paradigm. This survey of over 1600 participants from 56 countries highlights the information security challenges facing organizations today and how they are managing them – so you can focus on the most critical risks, and identify your strengths and weaknesses to improve information security
This information security guide provides guidance to organizations and auditors on assessing the level of security risks to the organization and evaluating the adequacy of the organization’s risk management.
Is the dominance of Microsoft posing a risk to security? This paper argues that software monopoly has an additional cost: security vulnerability.
As global economic conditions continue to fluctuate, information security hovers in the balance caught between a new hard-won respect among executives and a painstakingly cautious funding environment. Signs of security’s strategic gains and advances stand side by side with newly emerging cracks in its foundation.
This presentation makes the connection between corporate governance, information technology IT governance, information security governance, and risk management.
This paper discusses the role and importance of effective Information Security Management (ISM), how it is supported by an extensive family of global standards and the way these harmonize with ITIL
Please login to unlock all 65 posts in Information Security Hub