The Case for PIM/PAM in Today's Infosec
By Barbara Filkins
20 Critical Security Controls
Critical Controls for Effective Cyber Defense: Consensus Audit Guidelines
The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks and find the ones that get through. The automation of these Top 20 Controls will radically lower the cost of security while improving its effectiveness.
The 20 Coolest Jobs in Information Security
The 20 career descriptions in this booklet are designed to help those interested in entering the field to select the career path that best matches their abilities, their interests, and their objectives.
Internet Storm Center
Internet Security Monitor, Analysis and Alert System
The ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers.