Policy

Senate cyber bill killed again, Obama signs directive

By

Last month, President Obama signed the "secret" measure, called the "Presidential Policy Directive 20," which will allow the military to more aggressively fight cyber threats.

Plan BYOD with the workers

Plan BYOD with the workers

Most BYOD discussions focus on technical issues, such as how to identify offending devices, how to keep them off the network, or how to limit the types of devices. But nobody is talking about the human element.

Living in a world of trust

Living in a world of trust

You can protect your brand's online reputation, says ZeroSpam's David Poellhuber.

Infrastructure wake up call

Infrastructure wake up call

The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.

Alliance of IT security groups issues cyber principles for government

By

An international confederation of security groups is calling for more cooperation, openness and transparency in government implementations of cyber security.

Managing policy and risk requires sophisticated tools

Managing policy and risk requires sophisticated tools

By

Risk is a multilayered function derived from threat, vulnerability and impact.

Protect the network and boost productivity

Protect the network and boost productivity

Application control is now an absolute necessity in a comprehensive security policy because threats have evolved.

Internet security an early focal point for new government

By

Internet security vaulted into the spotlight as an early focal point for Prime Minister Stephen Harper's new government, on both the domestic and international fronts

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US