Tabletop exercises are a low-stress, high-impact way to test your plans for handling a crisis. Here are some tips for getting the most out of the process, plus six scenarios you can use to start your journey.
Executive Guide PDF provides BC/DR practicals
Definitions, challenges, and implementation tips from the trenches. [PDF]
Six-part set of articles takes 360-degree look at the implications of new laws that require organizations to notify people whose personal information has been compromised
A new Moody’s service aims to create the security world’s equivalent of Aaa to C ratings, replacing the need for companies to do vendor assessments. But it will only work if enough companies sign up.
Encryption tools in ’Mujahedeen Secrets 2’ show a software development lifecycle with increasing level of sophistication, Jeff Bardin says
Sure, LinkedIn and Facebook present security, privacy and productivity challenges. But if the sites are so bad, then why have so many security and privacy leaders joined them?
Readers ask, is Internet Explorer the ‘promiscuous’ browser or the prudish one? Neither, Grossman responds