Searched for: "information security management made simple"
- Security (81)
- Banking (4)
- Data Centers (4)
- Microsoft (4)
- Collaboration (2)
- Software (2)
- After Hours (1)
- Apple (1)
- Cloud (1)
- Cxo (1)
- Data Management (1)
- Developer (1)
- Enterprise Software (1)
- Google (1)
- Hardware (1)
- Mobility (1)
- Networking (1)
- Printers (1)
- Project Management (1)
- Social Enterprise (1)
About 111 results for "information security management made simple"
Defending the last missing pixels: Phil Zimmermann speaks out on encryption, privacy, and avoiding a surveillance state
Since writing the PGP encryption software in the 1990s, Phil Zimmermann has been a key figure in the internet privacy debate. With that argument heating up again, his perspective i...
Of the 10,000-plus staff at the Government Code and Cypher School during World War II, two-thirds were female. Three veteran servicewomen explain what life was like as part of the ...
Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the serious consequences of the fi...
Adobe Digital Editions has raised privacy concerns among users. Find out why encryption is not the answer.
Quality Independent Physicians, an accountable care organization, recently implemented the Red e App for secure communications between physicians in their network.
The role of the chief information security officer (CISO) has not changed much over the last few years, yet the perceived importance of a CISO has increased exponentially.
The versatility of VoIP has made it the leading choice for companies seeking an updated phone system that enables them to do more for less. Coming to the conclusion that you want V...
Unlock information hidden inside Google Docs for your organization with this one change to Google Apps settings.
Jesus Vigo provides a step-by-step guide for how to add a 3rd-party SSL certificate to OS X Server.
As nations spend billions of dollars stockpiling digital weapons and tension grows between them, the risk of world cyber warfare has suddenly turned offensive.