Unofficial / unverified article describing Canada's export controls on cryptographic software.
A widely used, peer-reviewed, comprehensive methodology for performing security tests.
Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall.
Articles on security policy and other information security topics.
Article discusses the elements of a corporate security policy, which it calls the gateway to a company`s intellectual property. The main threat to information security within a company is its employees.
a guide to developing computer security policies and procedures for sites that have systems on the Internet. Published 1997.
Objective analysis reveals that many breaches are linked to common weaknesses in the security policy...accidents waiting to happen. This article focuses on strategic and systematic weaknesses that can slowly degrade security operations.
This paper focuses on providing the reader with an overview of the current virus landscape and aids in developing best practice anti-virus policies.
Proxy based system to aid in implementing employee internet use policies.
Information hub for the enterprise discussing network security, storage compliance, CRM, and human resource.
|