Policy

E973b16363b3de77b360563237df7e32

Telco SLA Parameters and Penalties

June 23, 2010 Added by:Bozidar Spirovski

Communication links provided by Telco providers are critical to most businesses. And as any network admin will tell you, these links tend to have outages, ranging from small interruptions up to massive breakdowns that can last for days.

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

How to get certified against ISO 27001?

June 23, 2010 Added by:Dejan Kosutic

You have been implementing ISO 27001 for quite a long time, invested quite a lot in education, consultancy and implementation of various controls. Now comes the auditor from a certification body - will you pass the certification?

Comments  (1)

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance Priority Projects for 2010

June 22, 2010 Added by:Marjorie Morgan

In conjunction with the American National Standards Institute (ANSI), ISA published its first handbook for enterprises which examines corporate cyber security from an economic perspective as much as the technical one.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Social Media Policy

June 21, 2010 Added by:Javvad Malik

A humourous look at the realities in many organizations surrounding Social Media and the associated security risks and policy decisions.

Comments  (3)

6d117b57d55f63febe392e40a478011f

No Internet Kill Switch is No Guarantee

June 13, 2010 Added by:Anthony M. Freed

In continued efforts to centralize the cybersecurity authority within the White House, more than 40 bills have been introduced that will dramatically alter the balance of power between the government and the private sector. Protecting Cyberspace as a National Asset Act of 2010 will shift the responsibility of federal agency cybersecurity from the Office of Management and Budget (OMB) to DHS by cre...

Comments  (3)

509ea0c1f4a210534eb004d35c10aa2d

DHS Cyber Security Resources Catalog

June 12, 2010 Added by:Marjorie Morgan

The Department of Homeland Security (DHS) has released a "Private Sector Resources Catalog" collecting training, publications, guidance, alerts, newsletters, programs, and services available to the private sector. This is the first such effort to encompass all of DHS and represents a commitment to facilitate public access and increase transparency.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Divine Security Policy

June 12, 2010 Added by:Javvad Malik

So companies spend countless hours writing their security policies and this isn't an easy task. Each policy has to be drafted, proof read, re-drafted, re-proof read and then published. It's at this point that the real fun begins where users have to be educated in the ways of the new policy. Gap analysis have to be conducted and new baselines set.

Comments  (0)

Page « < 33 - 34 - 35 - 36 - 37 > »