Policy

69dafe8b58066478aea48f3d0f384820

Senator Proposes New Cybersecurity Legislation

February 10, 2011 Added by:Headlines

"Cyber-threats are not on the horizon, they are upon us. Businesses and investors must trust that their investments are secure. We cannot allow security breaches to undermine our trust in the U.S. economy," said Senator Menendez...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Employee Privacy Enjoys Gains in the U.S.

January 22, 2011 Added by:David Navetta

2010 arguably was a breakout year for consumer privacy, but the year also brought about significant changes to employee privacy. Federal and state court decisions, state legislation and agency actions suggest that the U.S. may be moving towards a greater level of privacy protection for employees...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Tips for Taking Charge of a SysAdmin Team

January 16, 2011 Added by:Jamie Adams

When I enter the organization, I don't immediately request access to the systems but rather I begin going over architectural diagrams, operational procedures, and peering over the shoulders of the system administrators. If the aforementioned documents are not present, then we have a problem...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Congressman Wants WikiLeaks on Treasury Blacklist

January 14, 2011 Added by:Headlines

Blacklisting by the Treasury Department is equivalent to marking an individual or group on par with terrorist organizations, and would bar U.S. citizens and companies from doing business or providing any material support whatsoever for the rogue whistleblower organization...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

When Computers Watch Us, Who Watches Them?

January 10, 2011 Added by:Theresa Payton

When security guards use surveillance TVs they apply acumen, logic, intuition and skill. Computers use face recognition software and behavior patterns. This has far reaching opportunities to improve lives but potentially at the cost of your privacy. That does not mean I am opposed to it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Commerce Department to Reign Over Cyber Identities

January 08, 2011 Added by:Headlines

"We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities..."

Comments  (0)

F520f65cba281c31e29c857faa651872

CIOs Must Keep the Focus on the Big Picture

January 07, 2011 Added by:Rahul Neel Mani

A smart CIO knows when to stay out of tactical initiatives within the company, let his team get on with it, and keeps the focus on the big picture, says Anjan Bose, CIO Haldia Petrochemicals Ltd. Bose equips himself to see IT as a component of business, and never business as means to deploy IT...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Do We Know the Impacts of Net Neutrality?

January 07, 2011 Added by:Theresa Payton

Internet Freedom Advocates do not think it goes far enough. Watchdogs at the Electronic Frontier Foundation are afraid the FCC Order will squash new innovation and new company launches due to legal and costly barriers to entry...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Why QA Doesn't Do Security Testing

January 06, 2011 Added by:Rafal Los

Just because you're checking for the existence of the password requirement, or making sure pages aren't accessible without authentication doesn't actually mean you're doing security testing. In reality, this is just a small part of the overall security testing that applications require...

Comments  (1)

C787d4daae33f0e155e00c614f07b0ee

False Positives: The Best Way to Kill a Good Initiative

January 05, 2011 Added by:Robb Reck

The more we raise alerts about issues that either don't exist, or aren't worth the attention we give them, the less interested people are in hearing what we have to say. If we do it too much, eventually when we scream that the wolf is at the door, we will be ignored, and see our data get eaten up...

Comments  (0)

F520f65cba281c31e29c857faa651872

CIOs: Stop Talking Jargon - Start Talking Solutions

January 01, 2011 Added by:Rahul Neel Mani

CIOs need to stop talking jargon to their business colleagues, says Harvey Koeppel, Executive Director, Center for CIO Leadership. Have conversations around the business benefits behind that jargon and you will immediately get active support right up to the CEO...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The U.N. and Government Control of the Internet

December 30, 2010 Added by:Headlines

"We have to be careful about what institutions take the lead. The Chinas, the Irans, the Saudi Arabias of the world want to impose a territorial vision of control over cyberspace -- and if the ITU got its wishes, that's essentially what would happen..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

America's “There is No Security Anymore” Policy

December 28, 2010 Added by:Dan Dieterle

This is a change in policy from trying to keep people out, to monitoring and limiting the damage done when they do get in. And get in they have, numerous reports of large corporations, government, and military breaches have made headline news over the years...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

National Defense Authorization Act Omits Cybersecurity

December 22, 2010 Added by:Headlines

The omitted language includes the creation of White House based office to coordinate cybersecurity efforts and the creation of a Federal Cybersecurity Practice Board to enforce Federal Information Security Management Act compliance and implementation of NIST recommendations...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

How Do You Translate Information Security?

December 22, 2010 Added by:Allan Pratt, MBA

The bottom line is that we, as information security professionals, must speak with other business units in their own languages in order to explain the threats we deal with on a daily basis. Business units need to understand how their work can, and will, be affected when breaches happen...

Comments  (2)

49afa3a1bba5280af6c4bf2fb5ea7669

How to Weather the Outsourcing Storm

December 03, 2010 Added by:Mike Meikle

A quick overview, 2.8 million business support jobs lost since 2000, a large chunk of that being IT. Also IT stands to lose another 450k-500K jobs by the time 2014 rolls around. This is discussed in the eWeek article. InfoWorld points to the 500k IT jobs lost in 2008-2009 alone...

Comments  (0)

Page « < 32 - 33 - 34 - 35 - 36 > »