Blog Posts Tagged with "Security Management"

10e258c8d23d441b915c1b2333b6996a

HIPAA Regulations and Defining Meaningful Use

July 08, 2010 Added by:Jack Anderson

The Centers for Medicare & Medicaid Services is reviewing the public comments it received on the proposed meaningful use rule, and hopes to release a final rule early this summer...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Supreme Court: You Can Spy on Employees if...

July 08, 2010 Added by:Katie Weaver-Johnson

After several lower court rulings, the Supreme Court ruled that because the employers suspected that people were breaking the rules and using their mobile devices and pagers for non-business communications, the employers were justified in requesting and reading the text message transcripts...

Comments  (2)

959779642e6e758563e80b5d83150a9f

Effective Database Activity Monitoring

July 08, 2010 Added by:Danny Lieberman

It seems that DLP vendors are moving up the food chain into DAM (database activity monitoring?). As customers deploy two products in parallel for DLP and DAM – the opportunity for reducing TCO seems to be a clear imperative...

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

Problems with Defining the Scope in ISO 27001

July 07, 2010 Added by:Dejan Kosutic

The problem when the ISO 27001 scope is not the whole organization is that the Information Security Management System must have interfaces to the outside world - clients, partners, suppliers etc., but also the organization's departments that are not within the scope...

Comments  (0)

1789975b05c7c71e14278df690cabf26

Hackers May Be Giants with Sharp Teeth

July 06, 2010 Added by:Pete Herzog

Interestingly, the point of a risk assessment is to determine vulnerabilities, assets, and threats. So why does a 9-year-old know what so many security professionals don't? Why does she realize that imagining what the threat looks like is just an exercise in creativity, not prediction?

Comments  (3)

72cc4c5e6cbde70aa374bf94076ad722

A perspective on the theft of confidential documents by former employee at Ford.

April 09, 2010 Added by:Peter Abatan

When I read that a former Ford product engineer had stolen over 4000 confidential documents containing trade secrets from his former employer, I began to wonder how many companies out there are as vulnerable to the same degree as Ford. Fortunately for Ford this employee got caught, but it remains unknown how many employees have successfully got away without Ford’s knowledge?

Comments  (6)

65be44ae7088566069cc3bef454174a7

Inside the Perplexities of Enterprise Privacy Policies

April 01, 2010 Added by:Rebecca Herold

An important consideration with information security incidents is identifying if personally identifiable information (PII) is involved. If it is, then the privacy breach response teamneeds to be put into action to determine whether or not an actual privacy breach occurred.

Comments  (0)

2ae549cf604c064a34019c7bd4a81e24

Newbie introduction to digital forensics Part 1.

March 08, 2010 Added by:Juan Granados

The economic and business challenges of the last year have forced changes to business priorities in many areas. For IT, increased scrutiny was placed on data leakage and security. When times are good, businesses can become distracted with new products and technologies. It is not until budgets are cut that the focus moves inward.

Comments  (1)

09e5dbdf8a3bd6dccce5621459b11e26

Containment Phase - Incident Response

December 19, 2009 Added by:Mark Bennett

...the whole point of Incident Response..Having a Plan! In the containment phase of Incident Response you want to prevent the attacker from getting any further into the organization or spreading to other systems.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »