Items Tagged with "Regulation"


91648658a3e987ddb81913b06dbdc57a

Don't Ask..Don't Yell

June 07, 2010 Added by:Ron Baklarz

In case you have not been following the current slew of cyber security-related legislation that has been penned during the 111th Congress, there are currently 35 different laws in various stages of the legislative process.  Melissa Hathaway, former White House cyber security advisor, has recently released a study of these legislations

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Anton Chuvakin's Compliance Mega-Epiphany

June 01, 2010 Added by:Anton Chuvakin

After spending a week at an amazing Project Honeynet  2010 Annual “Get-together” in Mexico City, I realized that the workshop environment was missing one big thing: nobody ever mentioned COMPLIANCE (!!!).

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

Dealing with ISO 27001 & BS 25999-2 Internal Audits

May 20, 2010 Added by:Dejan Kosutic

If this is the first time you have come across the notion of internal auditor, you are probably puzzled – Why would I need another control? Who is going to pay for it? Who should I employ to do it? It is such a waste of time…

Comments  (0)

37d5f81e2277051bc17116221040d51c

Why American’s Identities Are Easily Stolen

May 06, 2010 Added by:Robert Siciliano

We can fix this thing, but we won’t because we don’t want to be inconvenienced. I’m introduced to amazing technologies every week that will stop this. All they need is government support and system wide adoption. Meanwhile, Chuck Schumer and Ed Markey and the rest of the grand standing politicians scream about privacy and security issues when they see an opportunity for publicity...

Comments  (3)

924ce315203c17e05d9e04b59648a942

New Regulations Will Not Prepare the US for Cyberwar

April 08, 2010 Added by:Richard Stiennon

Senators Rockefeller and Snowe have formulated a new Cybersecurity bill that they describe in today’s Wall Street Journal.  (Use Google news to get to the full article.)  The Bill as proposed will be very disruptive to the operations of every business and will do essentially nothing to prepare the US for cyberwar.

Comments  (0)

1e44bd91360d3c685c3d78efcf0bea2e

Consider Outsourcing Your Network Security

January 27, 2010 Added by:Ken Leeser

As more and more critical applications and services move to the cloud, organizations are increasingly receptive to the idea of using a managed security service to protect their network and information assets.

Comments  (1)

Page « < 5 - 6 - 7 - 8 - 9 > »