Privacy regulations are about to become one of the great constraining forces on e-commerce, and one of the final legal bastions of personal protection for individuals,...
|
|
The role of the Chief Risk Officer is to directly assess and holistically manage all aspects of risk brought to bear on the enterprise by IT security and...
|
|
In most cases, using a phased implementation approach for Security Policy allows enterprises to begin to reap policy benefits quickly without causing the massive culture...
|
|
This video introduces the key driver of personal and unmanaged applications (PUAs) and the potential long term application portfolio strategy to integrate these into the...
|
|
It is suddenly that time of year again: time to review past predictions, rank them, and create a new set, in the hope that, by being reasonably accurate, they will assist...
|
|
London, ON July 11, 2011 – Growing security and compliance concerns signal big growth in the awareness and adoption of SIEM solutions in the coming year, according to a...
|
|
About five years ago, Ray Ozzie, then newly anointed chief software architect at Microsoft, described the world he saw, from a security perspective, and the vision was...
|
|
London, ON – June 27, 2011 – A recent Vendor Landscape report evaluating dedicated Secure Socket Layer Virtual Private Network (SSL VPN) appliances published by Info-Tech...
|
|
We have now been warning members of the dangers of a cyber attack on their corporate Intellectual Property for several years. We think the current level of threat has...
|
|
In order to fully appreciate our concept of "Economic Cyberwar," one should start with the idea that the form of war preferred by mercantilist states is not militarist,...
|
|