In early May, the FTC’s Chief Administrative Law Judge held that in an enforcement action the FTC must disclose “what data security standards, if any” it has published and intends to rely upon to demonstrate that a company’s data security practices are not reasonable and appropriate.
On January 1, 2014, California implemented an amendment to its breach notification law. The law applies to companies doing business in California that experience a security breach exposing personal information.
Background screening is often the first line of defense against insider threats in an enterprise,
January 28, 2014
Background screening is often the first line of defense against insider threats in an enterprise, but according to Employment Screening Resources CEO and Founder, attorney Lester Rosen, “2014 promises to be the year of challenges in screening.”
Employers have long recognized that conducting due diligence on new hires is a mission critical task. When it comes to any position dealing with Information Technology (IT), the stakes go up exponentially due to the sensitive nature of access to data and systems that operate the company.
Security integrators play an interesting and integral role in the security industry – they are part salesman, part customer service agent, part repairman, engineer, consultant… the list could continue. So with all of these competing roles, how do you, as a security executive, sort through the options to find a security integrator who will work with you in the long-term, not just plug in the cameras and walk away?
Terrorism is changing. The Center for Cyber & Homeland Security at George Washington University is striving to bring science to the art of security decision-making. What can their research into cyberattacks, terrorism and the evolving threat environment do to help your enterprise? Read about this, sports security, security culture and awareness and more in the July issue.