-
Legacy infrastructure-centric security policies and operations versus the use of more agile data-centric security models and policies.
FORBES: Some Ideas on Making GovCloud Achievable
-
The seeming inevitability of these attacks makes many companies wonder whether all of their internal data privacy and security policies are worth the expense.
FORBES: Cyberattacks -- Is North Korea Already At War With Us?
-
The registration process asks each company to submit information in several categories: basic company profile, general information on number of employees, products and services, financial information on annual revenues, their ability to support electronic business transactions, any quality and environmental management certifications, details on their ethical dealings and social responsibility, information on data security, information on diversity policies, and on their use of independent contractors.
FORBES: How to Improve the Economy and Beat Bureaucracy: Hire Small Businesses as Suppliers
-
Compare policies to various compliance regimes such as PCI DSS (Payment Card Industry Data Security Standard) and generate reports for audits.
FORBES: Reduce Policy Complications to Enhance Security
-
This adds to two Facebook-related security holes that surfaced last week, in which there were likely no malicious intentions but which didn't help already-concerned Facebook users from wondering just how safe their data is on a site that repeatedly modifies its privacy policies and has had a well-documented recent history of security flaws and phishing scams.
CNN: Amid backlash, Facebook tries to save face