From all of the security controls an organization could deploy, which one do you feel adds the most actual value for day-to-day info security and why?
Browsing: Data Privacy
The project risk management process is similar to the information security risk management and consists of four stages
On reading the subsequent news stories, no doubt many people wondered how anyone could have been so careless.
Kroll Ontrack and Blancco have announced a strategic partnership whereby Kroll Ontrack will be offering Blancco’s market leading suite of erasure software
Salesforce.com, Gmail, and Google Docs are examples; your data isn’t on your computer—it’s out in the “cloud”, and you access it from your web browser.
The challenge for leaders is to create a BYOD strategy that allows employees to accomplish more work while protecting sensitive information from data theft.
Since January 2013, 48 data breaches have occurred in the education sector, including K-12 and higher education institutions
Protecting your Smartphone with a strong password or pattern is one of the simplest ways to strengthen the access security of your Smartphone.
Managing stakeholders and communication is therefore becoming one of the essential skills of the modern security professional.
Recently, I received a detailed letter from a credit card company. This flyer looked very different than the brochures that often accompany my statements