Email Alerts
-
Know Your Enemy -- Learning about Security Threats: Chapter 8, Legal Issues
Find out more about the legal issues swirling around the use of Honeypots. Tip
-
COPPA likely would be as ineffective as CAN-SPAM
In this Guest Commentary, security expert Ira Winkler talks about antiporn legislation and protecting children from offending online material. Tip
-
Episode II: Creating security regualtions
In our last episode the Kingdom's network and system administrators were slaying fire-breathing worms (and whatnot). Tip
-
Of hackers and Hannibal Lechter
Ira Winkler, CISSP, responds to op-eds on the topic of hiring hackers. Tip
-
Fighting the hacker myth
Ira Winkler continues the debate on hiring hackers. Tip
-
The FDA's regulation for the use of electronic records and signatures
If your organization is required to keep records or make reports to the FDA, you need to understand how 21CFR11 affects your use of electronic signatures. Tip
-
A directive for disaster
Take a closer look at "FIL 43-2003 Computer Software Patch Management" issued by the FDIC and learn how this document could help hackers break into banks. Tip
-
The PATRIOT Act and Carnivore: Reasons for concern?
Stephen Mencik introduces the controversial PATRIOT Act and FBI surveillance tool, Carnivore. Tip
-
Seeking CyberHolmes
Learn about the job market for IT crime-detection professionals. Tip
Security Management Strategies for the CIO