March 11, 2014 Added by:Rafal Los
Let’s face it: The industry has a ‘box problem.’ And everyone will sell you a solution to what ails you.
March 11, 2014 Added by:Michael Fimin
In order to figure out where auditing should play a part in your security strategy, let’s start by defining what should be audited as part of a security plan. To do this, look first at how security is implemented in its most simple form and work backwards to auditing’s role in your strategy.
March 10, 2014 Added by:Kevin L. Jackson
After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that "an overwhelming 74 percent believe security for cloud-based data in 2014 will be a bigger concern than securing data on-premise."
March 10, 2014 Added by:Electronic Frontier Foundation
We call upon the Human Rights Committee to note the thirteen 13 International Principles for the Application of Human Rights to Communications Surveillance...as a guidance for understanding a State Party’s compliance with Article 17 on the right to privacy.
March 10, 2014 Added by:Tal Be'ery
Organizations may find themselves in a “PCI’s Catch 22″ situation: Implementing PCI’s recommended Smart Card Logon for Windows may be in breach of another PCI requirement: to change passwords on a regular basis.
March 07, 2014 Added by:Anthony M. Freed
The growing cybersecurity skills and personnel gap that makes recruiting and retaining personnel with the prerequisite expertise increasingly difficult for both the public and private sectors may have reached a point where it has become “a national security crisis,” according to statements from Art Gilliland, SVP and general manager, Enterprise Security Products for HP.
March 06, 2014 Added by:Dan Dieterle