A consultant colleague recently reached out with some questions on how to craft a good organizational information security policy. I’ve got experience with this, as a graduate-level legal instructor, ...
The FBI is in the midst of a major rewrite of the security policy that sets minimum criteria for how its criminal justice information is protected. With the revamp, the bureau is aiming to make sure ...
Database security, like all other areas of strong security, must be based upon a multitude of policies, processes, and controls. DAM is one layer of defense-in-depth, but database security should also ...
Data serves as the lifeblood of most businesses today, and safeguarding its security is imperative. I believe this commitment is not merely an obligation to uphold ethical and legal standards; it also ...
The Federal Trade Commission will have its eye on privacy and data security enforcement in 2023. In August, the agency announced that it is exploring ways to crack down on lax data security practices.
Archimedes famously said the quickest route between two points is a straight line. He meant geometry, though I argue this concept applies seamlessly to data security. To secure data in enterprise ...
“The information gleaned from the [privacy due diligence] process may result in a change in plans as to the level of operational integration that the acquirer may ...
In this article, Simon Bowker, managing director of eCircle UK details the importance of implementing consumer data protection and provides tips on how to do so. Subscribers can download a copy of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results