There’s been a lot of discussion about biometrics.
IT qualifications and security certifications are becoming more and more important to both individuals and companies alike, especially important in this current politically turbulent climate.
With the internet and mobile working playing an increasingly important roles in business, connecting to internal systems is becoming far easier.
The widespread impact of the SQL Slammer worm in January 2003 highlighted an issue that most security professionals see as a basic fact – IT system security is not based on a single installation, but on an ongoing management of risks and vulnerabilities.
We often hear of prevention being better than cure.
The ability to maintain a healthy balance between personal privacy and stringent enterprise security standards has been a sensitive and long-lasting struggle among security vendors and privacy advocate groups.
As the market for content security products and services continues to grow, it is interesting to compare and contrast the delivery of content security via ‘insourcing’ and outsourcing.
Trust has always been one of the key elements in any business relationship.
This question was raised at a recent shareholders meeting: “Can the Board of Directors assure us that this organization’s information security program is deployed fairly and legally in every jurisdiction in which we operate?”