Vendors form Cyber Security Industry Alliance to coordinate Washington, boardroom approaches to security
Retaining data isn't enough. IT faces a host of regulations that address maintaining log files—tracking who did what and when—along with the requiring access to them in very short order.
Not knowing who’s accessing what is a recipe for auditing disasters
Interest is growing in a new British Standard—BS7799—that is slowly being adopted outside of Britain; companies adopting the standard may find they've implemented a best-practices security program.
Auditing can do more than just help you meet a host of new regulations. Last week we outlined several significant business benefits. This week we explore your options. (Second in a two-part series.)
Near-real-time monitoring may help your company catch attackers and restore altered data.
Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)
New legislation has failed to stem the tide of unsolicited e-mail, protecting e-mailers who follow the letter but not the spirit of the law.