The Three Ps of Data Breach Response

The Three Ps of Data Breach Response

As demonstrated by recent security breaches at several large, tech-savvy companies such as Yahoo and Target, data breaches are not a matter of if—but when—they will occur. Your organization has to consider this: what is your plan of action after a data breach, when...
How to Carry Out A Security Assessment

How to Carry Out A Security Assessment

Security assessments can mean different things to different people. This paper should help you to explore what a security assessment is. This paper will then provide useful principles for your security assessment projects, with a focus on holistic security management...
What is Cloud Computing?

What is Cloud Computing?

What is cloud computing? Can your organization have its own cloud? Privately, there are executives that have mocked the use of public cloud in the past, and for good reason: First: Management and Security. There are a number of security issues/concerns associated with...