The Open Group Library

Security

Set Ascending Direction

1-10 of 20

Page:
  1. 1
  2. 2
  1. Open FAIR™ – STIX™ Integration

    This White Paper provides guidance for closing the gaps between the methods and tools used to respond to information system attacks and those used for defense.
    Learn More
  2. How to Put Open FAIR™ Risk Analysis Into Action

    A Cost-Benefit Analysis of Connecting Home Dialysis Machines Online to Hospitals in Norway.
    Learn More
  3. IT Risk Management Survey Summary

    This White Paper presents the findings from a survey conducted jointly by The Open Group, the Society of Information Risk Analysts (SIRA), and CXOWARE, Inc. The survey sought to determine the current state of information risk management practices in enterprise organizations.
    Learn More
  4. Best Practices for Security in Cloud Adoption by Indian Banks

    This White Paper describes the legal environment prevailing in India, and discusses security requirements at length and the security remediation measures and security controls for IaaS and SaaS cloud services. The opportunities for cloud computing adoption, along with deployable architectures, are also well articulated and shown.
    Learn More
  5. An Introduction to the Open FAIR Body of Knowledge

    A Taxonomy and Method for Risk Analysis
    Learn More
  6. The Need for Data Principles

    This White Paper explains why our Information Technology industry needs to establish a set of high-quality data principles, and lists a draft base set of Data Principles.
    Learn More
  7. Protecting Information: Steps for a Secure Data Future

    This White Paper explains why information protection to meet today's and tomorrow's requirements needs to use stronger, more flexible protection mechanisms around the data itself.
    Learn More
  8. Managing Network Entities in a Collaborative World

    This White Paper reviews the challenges in management of networked devices, across the enterprise and into collaborating business enterprises.
    Learn More
  9. Information Security Management (20 CSC)

    Using the O-ISM3 Standard with the CPNI 20 Critical Security Controls (CSC) for Effective Cyber Defense
    Learn More
  10. Jericho Forum® Data Protection

    This White Paper contends that data protection to meet today's and tomorrow's requirements needs to provide stronger, more flexible protection mechanisms around the data itself.

    Superseded by W142

    Learn More

Set Ascending Direction

1-10 of 20

Page:
  1. 1
  2. 2