- 'Ghost' vulnerability poses high risk to Linux distributions
- Australian information security posture weak by world standards: Cisco
- Remotely exploitable ‘GHOST’ bug strikes all Linux distros
- A new kind of DDoS threat: The "Nonsense Name" attack
- Old arguments may bog down US data breach notification legislation
Information Security Policies, Standards and Procedure
As a result of the adjustments in the way business is conducted, ownership of information does not carry the same clear accountability it once did. Physical and behavioural boundaries used to exist around information management but these can be missing in the modern workplace. Clearly thought-out information security policies, standards and procedures addressing internationally supported standards, will go a long way to addressing the risk exposure these changes have created. In this third paper, “Policies, Standards and Procedures,” we discuss guidelines for effective information security management.
Please supply your email address to access the content.
- Digital disruption isn’t disruption anymore: Why it’s time to refocus your business
- CEO survey: Digital technology for customer engagement and data provides big business value
- Snapchat and Twitter violate each other's personal space
- Personalisation drives Colliers International website overhaul
- Gartner foresees 250m connected vehicles on the road by 2020