In early May, the FTC’s Chief Administrative Law Judge held that in an enforcement action the FTC must disclose “what data security standards, if any” it has published and intends to rely upon to demonstrate that a company’s data security practices are not reasonable and appropriate.
On January 1, 2014, California implemented an amendment to its breach notification law. The law applies to companies doing business in California that experience a security breach exposing personal information.
Background screening is often the first line of defense against insider threats in an enterprise,
January 28, 2014
Background screening is often the first line of defense against insider threats in an enterprise, but according to Employment Screening Resources CEO and Founder, attorney Lester Rosen, “2014 promises to be the year of challenges in screening.”
Employers have long recognized that conducting due diligence on new hires is a mission critical task. When it comes to any position dealing with Information Technology (IT), the stakes go up exponentially due to the sensitive nature of access to data and systems that operate the company.
Security integrators play an interesting and integral role in the security industry – they are part salesman, part customer service agent, part repairman, engineer, consultant… the list could continue. So with all of these competing roles, how do you, as a security executive, sort through the options to find a security integrator who will work with you in the long-term, not just plug in the cameras and walk away?
Global Security Operations Centers (GSOCs) are a valued necessity to support an enterprise’s global business goals and operations today, but building one requires buy-in, organization and insight from the enterprise’s internal and external customers, including its GSOC operators.