When it comes to IT security, data is the crown jewel. This is not to say that networks and other...
Month: January 2014
Predicting is easy. When it’s made, one prediction is as good as another. Only in hindsight can you pick the...
Muzamil Riffat, CISA, CRISC, CISSP, PMP, GWAPT For most people, the notion and understanding of privacy tends to be fluid....
Samir Malaviya, CISA, CGEIT, CSSA Supervisory Control and Data Access (SCADA) systems are the backbone of critical infrastructure. Recent developments,...
Stefan Beissel, Ph.D., CISA, CISSP The handling of sensitive data requires compliance to standards and laws that include high demands...