Management, compliance & auditing

Information Security Policy For SME

Information security (IS) is a critical part of any small scale company and a big enterprise, and a challenge for any firm. Information security involves ver

Top 10 Common Misconceptions About Application Whitelisting

Application Whitelisting is a technology that has been in use in the security world for quite a long time. For those who may not already be familiar with AWL

OSSEC

Introduction In this article we'll present the open source host-based intrusion detection system, which is needed if we would like to detect host-based attac

Enterprise Security Management

An enterprise invests considerable amount of time in its day to day scanning and managing patched for the infrastructure. But, an enterprise psychological an

Conditional Complexity of Risk Models

Introduction "Conditional complexity" (also called cyclomatic complexity) is a term used to measure the complexity of software. The term refers to the numbe

U.S. Cyber Policy – Course and Legal Aspects

Image courtesy of Gualberto107 / FreeDigitalPhotos.net [pkadzone zone="main_top"] Introduction Cyber policy is an important issue that many would qualify

Software Patent Law: EU, New Zealand, and the US compared

1. Introduction A patent is defined as an exclusive right or rights provided by a government to an inventor for a certain period of time in exchange for the

Exception management

An organization is a complex structure. We can set up frameworks, lay out processes and chart our policies and procedures to be followed; however, in practic

Anatomy of a Risk Assessment

To an organization that is serious about security and wants to identify the most efficient way to invest in security solutions, a risk assessment is absolute

Differences between the privacy laws in the EU and the US

Everything we do in the Internet leaves digital fingerprints. Therefore, it is only logical that many web users are worried about the issue of privacy. Their