The IAPP has launched a new privacy certification designed for IT, security and engineering pros. What are the key elements of this new program? JC Cannon, a privacy author and educator, shares details.
Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.
FireEye has just appointed a privacy officer and handed him a big mission: Launch a new global privacy program. What is Shane McGee's strategy for this new role, and what will be his top challenges?
Can a smart phone increase your privacy and security while remaining both highly usable and attractive to buyers? The inaugural Blackphone is testing that question for consumers and businesses.
Organizations can substantially benefit by having a process in place for the use and management of administrative privileges.
Read this white paper for tips on:
Developing and enforcing policies for privileged accounts;
Minimizing the use of shared administrative accounts;
Verifying the privileges...
Effectively managing privileged accounts has become critical as security and compliance emerge as the driving forces behind most IT initiatives. Unfortunately, native tools and manual practices for privileged account management are inadequate for today's complex heterogeneous enterprise.
Explore this white paper...
A U.S. federal court judge has upheld a warrant requiring Microsoft to give the Justice Department copies of e-mails being stored at a data center in Dublin. But Microsoft plans to appeal the ruling on privacy grounds.
NIST says its recommended changes to security and privacy assessment procedures should result in significant improvements in the efficiency and cost-effectiveness of control assessments.
Vendors are rushing useful new "Internet of Things" products to market, but too often treat device security and data privacy as an afterthought, says Forrester Research analyst Andrew Rose.
Privacy attorney Tanya Forsheit, founding partner of the InfoLawGroup, has just joined the LA office of national firm BakerHostetler. What is her focus, and what advice does she offer attorneys entering the field?
A controversial U.K. "emergency" surveillance bill has become law, just seven days after being introduced to Parliament. But a privacy rights group has already promised to challenge the new law in court.
The largest data breach reported in June resulted in the exposure of 1.3 million identities. This seems like a small number when compared to the 145 million exposed in the largest breach of May. However, while reported in June, this breach also took place during the month of May. This brings the total number of...
The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
This analysis provides:
An evaluation of...
FireEye has just appointed a privacy officer and handed him a big mission: Launch a new global privacy program. What is Shane McGee's strategy for this new role, and what will be his top challenges?
Schools are embracing the use of technology to cut costs, to perform research, roll out computer-based classes and exercises and to compete for students. At the same time, the school administration is being asked by parents, state, local, regional or even federal governments to make sure that students and faculty are...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.