New & Notable
Information Security Laws, Investigations and Ethics News
October 10, 2014
News roundup: Colleges across the country are offering courses in offensive hacking, but are they ethical? Plus: Why the first 'online murder' may happen in 2014; Palo Alto and NSS Labs make up; numerous Android security issues surface.
September 12, 2014
News roundup: City-sponsored situational awareness software use at a music festival illustrates the importance of enterprise surveillance strategy evaluation. Plus: Apache Tomcat upgrade; OpenSSL security policy; and call center security concerns.
July 10, 2014
News roundup: Facebook's manipulation of users' news feeds has reignited the data privacy debate regarding how enterprises should manage user data.
June 26, 2014
Special report: The handling of an OWASP employee's disputed harassment claim has sparked a debate over the group's governance and its future.
Information Security Laws, Investigations and Ethics Get Started
Bring yourself up to speed with our introductory content
Wiretapping is the surreptitious electronic monitoring of telephone, telegraph, cellular, fax or Internet-based communications. Wiretapping is achieved either through the placement of a monitoring device informally known as a bug on the wire in ... Continue Reading
The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.R. 744), is a bill in the U.S. Congress that would criminalize the unauthorized use of spyware, phishing, and other methods of using the Internet to obtain sensitive ... Continue Reading
Evaluate Information Security Laws, Investigations and Ethics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Ernie Hayden takes an in-depth look at the development of NIST SP800-82 since its birth, and what the standard includes in the most recent revision. Continue Reading
Readers vote for the top authentication products in 2013: Digital identity verification products, services and management systems. Continue Reading
A decade after becoming law, the ripple effects of California's SB 1386 have surfaced in a new breed of proactive, granular state data privacy laws. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Use Of Solution: 4.5 years Valuable Features:...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Information Security Laws, Investigations and Ethics
Learn to apply best practices and optimize your operations.
The patchwork of state laws has not slowed epic data breaches. Will we see federal data breach notification laws in 2015? Continue Reading
Legislation designed to provide the federal government with threat data from the private sector gains steam. Continue Reading
Problem Solve Information Security Laws, Investigations and Ethics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The updated EU General Data Protection Regulation raises breach penalties for enterprises operating in the EU. Attorney Francois Gilbert explains. Continue Reading
The Stored Communications Act can come back to bite companies that fail to wipe personal data from corporate devices. Expert Mike Chapple discusses. Continue Reading
A state supreme court decision addressing webmail hacking under the Stored Communications Act affects email privacy and the ability to sue hackers. Continue Reading