Policy

D13f77e036666dbd8f93bf5895f47703

Pentagon Considers Preemptive Strikes as Cyberdefense

September 17, 2010 Added by:Theresa Payton

Safety & privacy - they can coexist but there is a healthy tension. Sometimes we give up privacy to be secure. Sometimes we guard our privacy and knowingly or unknowingly give up some of our security. It's a true conundrum. How much privacy are we willing to give up for that safety?

Comments  (0)

F520f65cba281c31e29c857faa651872

Strategies for Quality in Software Development

September 01, 2010 Added by:Rahul Neel Mani

Dr. Bill Curtis, Director, Consortium for IT Software Quality (CISQ) and the co-author of Capability Maturity Model (CMM), in an email interview with Geetaj Channana, talks about the need for standards in software development...

Comments  (0)

924ce315203c17e05d9e04b59648a942

What CXOs Fail to Grasp about Enterprise Security

August 10, 2010 Added by:Richard Stiennon

Government regulations and outside auditors have tremendously distracting effects on IT security people. They got into security because they like the day to day battle with bad guys- the technical challenge of securing networks and applications. They did not sign up for endless meetings and paper work...

Comments  (2)

37d5f81e2277051bc17116221040d51c

School Directors Face Background Checks

August 07, 2010 Added by:Robert Siciliano

A new bill in New Jersey would disqualify school board members from serving if they’ve been convicted of serious crimes. Further, it would require them to pay for the cost to get background checks themselves or with campaign money...

Comments  (0)

D53ddb574ebf68fcd3a4fcc6d5fb257a

Congress Proposes Sales Tax For Internet Sales

August 04, 2010 Added by:Michael Volkov

So far, 23 states have adopted streamlined tax systems to collect taxes and generate revenues, RILA said. Critics of the change argue closing the loophole on purchases made over the Internet would mean a tax increase for Americans...

Comments  (1)

Dd9902bc56a9d85cdc62c00083ea4871

10 Reasons for Ongoing Policy and Procedure Management

July 28, 2010 Added by:Katie Weaver-Johnson

Based on lessons learned and today's highly litigious, increasingly-regulated and safety-oriented society, it is critical for organizational policies and procedures to be clearly defined and communicated...

Comments  (1)

6d117b57d55f63febe392e40a478011f

Beyond Due Diligence - A Guide for Business

July 14, 2010 Added by:Anthony M. Freed

If your organization approaches due diligence as a measure of the minimum effort and expense required to satisfy conventional norms, your organization is woefully unprepared to navigate a rapidly changing business landscape...

Comments  (1)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance Briefs White House

July 12, 2010 Added by:Marjorie Morgan

ISA was a major participator in the development of the "Cyber Space Policy Review." The very first source cited in the Review is the ISA Social Contract for Cyber Security and the Executive Summary both begins and ends by citing the ISA...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

10 Essential Security Polices

July 08, 2010 Added by:Global Knowledge

Every organization needs a corporate security policy to firmly establish guidelines that will keep the company's resources and knowledge safe. This paper discusses ten such guidelines that should be included in every security policy. While certainly not a conclusive study of essential practices, these ten suggestions are a good place to start...

Comments  (3)

509ea0c1f4a210534eb004d35c10aa2d

ISA to Address NATO on Global Cyber Security

June 30, 2010 Added by:Marjorie Morgan

ISA President Larry Clinton has been asked to detail the implications of the ISA Cyber Security Social Contract as it relates to the future of Cooperation and Conflict in the Global Commons at an invitation only meeting in Virginia Beach today, June 30th.

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Security Policy Pontification

June 28, 2010 Added by:Mike Meikle

I recently answered a question regarding why the security policies for remote access were difficult to manage and adapt to change. The question came through Linkedin from a PR professional. “So why is the policy so hard to adapt?..."

Comments  (0)

7af56c65866a442699d6dd1dfb02b528

More IT complexity = More data-centric security

June 27, 2010 Added by:Eli Talmor

IT security professionals are engaged in a game of cat and mouse with hackers. As fast as they deploy security countermeasures, these rogue elements discover loopholes or entirely new avenues of attack. Traditional security methods have relied upon closely guarding the perimeter of a company's network.

Comments  (0)

E973b16363b3de77b360563237df7e32

Cloud Computing Data Protection World Map

June 25, 2010 Added by:Bozidar Spirovski

Security and privacy in cloud computing are hot topics, and everyone has a take on it. Cloud computing providers deliver their levels of security and privacy by their internal policies and procedures, but the rigidity of these policies are strongly influenced by government regulations.

Comments  (1)

Ba5964a1284ac16d4277991e7225699c

What could BP learn from our industry?

June 24, 2010 Added by:Jason Remillard

So do I think BP could learn from our industry on incident and emergency response? To be sure, they are very different industries, impacts and processes. However, for me, the responsibilty of business to be protective of their clients, supportive and acknowledging of client concerns and responsible for their actions.

Comments  (0)

E973b16363b3de77b360563237df7e32

Telco SLA Parameters and Penalties

June 23, 2010 Added by:Bozidar Spirovski

Communication links provided by Telco providers are critical to most businesses. And as any network admin will tell you, these links tend to have outages, ranging from small interruptions up to massive breakdowns that can last for days.

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

How to get certified against ISO 27001?

June 23, 2010 Added by:Dejan Kosutic

You have been implementing ISO 27001 for quite a long time, invested quite a lot in education, consultancy and implementation of various controls. Now comes the auditor from a certification body - will you pass the certification?

Comments  (1)

Page « < 33 - 34 - 35 - 36 - 37 > »