Third party information request policies

The Electronic Frontier Foundation issued a report on 18 web and technology companies that routinely handle data.  The study looked […]

Full Details

Risk Homeostasis and its impact on risk reduction

Gerald Wilde had a theory called risk homeostasis.  This theory hypothesizes that people have a level of acceptable risk.  When […]

Full Details

The Essential Link between Awareness and Security Policies

Information security policies and security awareness go hand in hand. Frankly, a policy is worthless if it sits on someone’s desk. […]

Full Details

Developing a Virtualization Security Policy

Since many organizations are rapidly virtualizing servers and even desktops, there needs to be direction and guidance from top management […]

Full Details