Print Issue: August 07, 2008
Keeping web technologies out of the workplace can have a detrimental effect on morale, says Yuval Tarsi.
This month we look at two aspects of verification and validation: policy management and vulnerability assessment.
More and more companies are getting requests for FISMA control assessments, says David Lawson, director, risk management and compliance, Acumen Solutions.
The U.S. should engage with the world to combat cyberthreats, says Howard Schmidt.
Can the Federal Information Security Management Act have an upside to the government, Eric Butterman asks.
Data breach laws have proven to be helpful to consumers, but daunting to those charged with enforcement.
Small- and medium-sized enterprises are often ignored by security vendors, and contend with unsavvy users a lot.
To keep up with its expansion, Denver-based Frontier Airlines sought to centralize its firewall needs.
The rise of organized online crime will be a major challenge in the next few years, says Illena Armstrong, editor-in-chief, SC Magazine.
With e-discovery laws in effect, companies find benefits to data archiving, says TLC Vision’s Roger McIlmoyle.
Next post in Features