Similar Articles |
|
Global Services May 27, 2007 Raj Chaturvedi |
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. |
Bank Technology News January 2007 Rebecca Sausner |
Information Security: There's No Substitute For Good Preparation The worst time to hammer out a security battle plan is after a breach occurs. Experts maintain that having a formal incident response plan in place is a business requirement today. |
InternetNews March 18, 2010 Larry Barrett |
FBI Says Cybercrime Skyrocketing A new report from the FBI says the rate of cybercrime incidents is growing rapidly at a cost of hundreds of millions of dollars a year. |
Bio-IT World May 9, 2003 Salvatore Salamone |
Catastrophes and Contingencies @#$! happens, but savvy IT managers can take it in stride by incorporating disaster recovery into everyday planning. |
PC World November 2005 Bruce Sterling |
Is the Net Doomed? One observer's take on why the Internet is the biggest crime scene in history and expert opinions on cleaning up Internet crime, including the need for an effort by the U.S. government. |
CIO June 1, 2001 Tracy Mayor |
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... |
Financial Planning September 1, 2006 Kurt Johnson |
Practice Tips Many disaster recovery plans look good on paper but lack the detail necessary to function in a real disaster. Consider these factors when establishing your recovery procedures. |