Information Security Policies
Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall.
Information Security Program Development
Security standards are needed by organizations because of the amount of information, the value of the information, and ease with which the information can be manipulated or moved.
Institute for Security and Open Methodologies (ISECOM)
Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
Internet Security Policy: A Technical Guide - Contents
This document is intended to help an organization create a coherent Internet-specific information security policy.
Internet/Network Security Policy Development
How to write an effective network security policy. This is Part 4 of a 5 part tutorial on Internet and network security.
IT Security Cookbook
An excellent guide to computer & network security with a strong focus on writing and implementing security policy. This is primarily for security managers and system administrators.
ITworld.com - Security's human side
IT World article - essentially a review of Pentasafe's VigilEnt security policy management product.
Make Your Web Site P3P Compliant
How to create and publish your company's platform for privacy performance policy, a W3C initiative, in 6 steps.
Network Security - Internet Security for the Enterprise
Information hub for the enterprise discussing network security, storage compliance, CRM, and human resource.
Open ISO 17799 Policies
A public collaberation to document this standard and create compliant security policies.
OSSTMM: Open Source Security Testing Methodology Manual
A widely used, peer-reviewed, comprehensive methodology for performing security tests.
An Overview of Corporate Computer User Policy
Article discusses the elements of a corporate security policy, which it calls the gateway to a company`s intellectual property. The main threat to information security within a company is its employees. [PDF]
PKI Policy Whitepaper
Provides general information about PKI policy, the role that policy plays in a PKI and how that policy applies to both traditional and PKI-enabled business environments. [PDF]
Policy Over Policing
InfoWorld article - It's easy to develop e-mail and Internet policies, but education and documentation are crucial to their success.
P3P Guiding Principles
Principles behind the W3C Platform for Privacy Preferences initiative.
Return on Information Security Investment
Assess your company's Return on Information Security Investment
RFC2196 (Site Security Handbook)
a guide to developing computer security policies and procedures for sites that have systems on the Internet. Published 1997.
SANS InfoSec Reading Room
Articles on security policy and other information security topics.
SecureZone
Information portal with focus on policies, protocols and standards
SecurityDocs
A substantial collection of papers and articles on the development and implementation of security policies.
Results: Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next